default search action
18. ISC 2015: Trondheim, Norway
- Javier López, Chris J. Mitchell:
Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lecture Notes in Computer Science 9290, Springer 2015, ISBN 978-3-319-23317-8
Cryptography I: Signatures
- Masayuki Fukumitsu, Shingo Hasegawa:
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model. 3-20 - Bei Liang, Hongda Li, Jinyong Chang:
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. 21-41 - Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao:
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. 42-60 - Aggelos Kiayias, Murat Osmanoglu, Qiang Tang:
Graded Signatures. 61-80
System and Software Security
- Kevin Falzon, Eric Bodden:
Dynamically Provisioning Isolation in Hierarchical Architectures. 83-101 - Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine:
Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study. 102-119 - Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad:
Software Security Maturity in Public Organisations. 120-138
Cryptanalysis I: Block Ciphers
- Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. 141-157 - Yuan Yao, Bin Zhang, Wenling Wu:
Automatic Search for Linear Trails of the SPECK Family. 158-176 - Pierre Karpman:
From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour. 177-188
Cryptography II: Protocols
- Franziskus Kiefer, Mark Manulis:
Oblivious PAKE: Efficient Handling of Password Trials. 191-208 - Sumit Kumar Debnath, Ratna Dutta:
Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter. 209-226 - Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou:
On the Efficiency of Multi-party Contract Signing Protocols. 227-243 - Jean Lancrenon, Marjan Skrobot:
On the Provable Security of the Dragonfly Protocol. 244-261
Network and Cloud Security
- Zeeshan Afzal, Stefan Lindskog:
Multipath TCP IDS Evasion and Mitigation. 265-282 - Xinyu Fan, Vijay Varadharajan, Michael Hitchens:
Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage. 283-298 - Cédric Van Rompay, Refik Molva, Melek Önen:
Multi-user Searchable Encryption in the Cloud. 299-316
Cryptography III: Encryption and Fundamentals
- Zhiwei Wang, Siu-Ming Yiu:
CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency. 319-335 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. 336-354 - Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Hashing into Jacobi Quartic Curves. 355-375
Cryptanalysis II
- Lin Jiao, Bin Zhang, Mingsheng Wang:
Two Generic Methods of Analyzing Stream Ciphers. 379-396 - Massimo Chenal, Qiang Tang:
Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. 397-418
PUFs and Implementation Security
- Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of RO PUFs. 421-436 - Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji:
Extracting Robust Keys from NAND Flash Physical Unclonable Functions. 437-454 - Yang Shi, Hongfei Fan:
On Security of a White-Box Implementation of SHARK. 455-471 - Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, Georgios Portokalidis:
GPU-Disasm: A GPU-Based X86 Disassembler. 472-489
Key Generation, Biometrics and Image Security
- Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage. 493-510 - Anu Aryal, Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki:
Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images. 511-523 - Andrea Miele, Arjen K. Lenstra:
Efficient Ephemeral Elliptic Curve Cryptographic Keys. 524-547 - Aggelos Kiayias, Ozgur Oksuz, Qiang Tang:
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications. 548-567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.