default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2016.bht:"
@proceedings{DBLP:conf/icisc/2016, editor = {Seokhie Hong and Jong Hwan Park}, title = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-53177-9}, doi = {10.1007/978-3-319-53177-9}, isbn = {978-3-319-53176-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AcharyaD16, author = {Kamalesh Acharya and Ratna Dutta}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Adaptively Secure Broadcast Encryption with Dealership}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {161--177}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_8}, doi = {10.1007/978-3-319-53177-9\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/AcharyaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AliC16, author = {Shoukat Ali and Murat Cenk}, editor = {Seokhie Hong and Jong Hwan Park}, title = {A New Algorithm for Residue Multiplication Modulo 2521-1}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {181--193}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_9}, doi = {10.1007/978-3-319-53177-9\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AliC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChangDXX16, author = {Jinyong Chang and Honglong Dai and Maozhi Xu and Rui Xue}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {239--253}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_13}, doi = {10.1007/978-3-319-53177-9\_13}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChangDXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CheonHKLS16, author = {Jung Hee Cheon and Kyoohyung Han and Jinsu Kim and Changmin Lee and Yongha Son}, editor = {Seokhie Hong and Jong Hwan Park}, title = {A Practical Post-Quantum Public-Key Cryptosystem Based on {\textbackslash}textsf spLWE}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {51--74}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_3}, doi = {10.1007/978-3-319-53177-9\_3}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CheonHKLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DebnathD16, author = {Sumit Kumar Debnath and Ratna Dutta}, editor = {Seokhie Hong and Jong Hwan Park}, title = {New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {254--284}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_14}, doi = {10.1007/978-3-319-53177-9\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DebnathD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DuW16, author = {Yusong Du and Baodian Wei}, editor = {Seokhie Hong and Jong Hwan Park}, title = {On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {304--316}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_16}, doi = {10.1007/978-3-319-53177-9\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DuongPWT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Revisiting the Cubic {UOV} Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {223--238}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_12}, doi = {10.1007/978-3-319-53177-9\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DuongPWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FengCGFF16, author = {Jingyi Feng and Hua Chen and Si Gao and Limin Fan and Dengguo Feng}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Improved Fault Analysis on the Block Cipher {SPECK} by Injecting Faults in the Same Round}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {317--332}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_17}, doi = {10.1007/978-3-319-53177-9\_17}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/FengCGFF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GiustolisiGAH16, author = {Rosario Giustolisi and Christian Gehrmann and Markus Ahlstr{\"{o}}m and Simon Holmberg}, editor = {Seokhie Hong and Jong Hwan Park}, title = {A Secure Group-Based {AKA} Protocol for Machine-Type Communications}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {3--27}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_1}, doi = {10.1007/978-3-319-53177-9\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GiustolisiGAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HuthAGDG16, author = {Christopher Huth and Aydin Aysu and Jorge Guajardo and Paul Duplys and Tim G{\"{u}}neysu}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Secure and Private, yet Lightweight, Authentication for the IoT via {PUF} and {CBKA}}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {28--48}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_2}, doi = {10.1007/978-3-319-53177-9\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HuthAGDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KhandakerONSD16, author = {Md. Al{-}Amin Khandaker and Hirotaka Ono and Yasuyuki Nogami and Masaaki Shirase and Sylvain Duquesne}, editor = {Seokhie Hong and Jong Hwan Park}, title = {An Improvement of Optimal Ate Pairing on {KSS} Curve with Pseudo 12-Sparse Multiplication}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {208--219}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_11}, doi = {10.1007/978-3-319-53177-9\_11}, timestamp = {Fri, 29 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KhandakerONSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimPKJHJR16, author = {Jeongsu Kim and Suyong Park and Seonggeun Kim and Busik Jang and Sang Geun Hahn and Sangim Jung and Dongyoung Roh}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Analysis of Error Terms of Signatures Based on Learning with Errors}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {75--97}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_4}, doi = {10.1007/978-3-319-53177-9\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimPKJHJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Lee16, author = {Kwangsu Lee}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {101--125}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_5}, doi = {10.1007/978-3-319-53177-9\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Lee16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuLLX16, author = {Yamin Liu and Xianhui Lu and Bao Li and Haiyang Xue}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Lossy Key Encapsulation Mechanism and Its Applications}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {126--144}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_6}, doi = {10.1007/978-3-319-53177-9\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuLLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MartinsS16, author = {Paulo Martins and Leonel Sousa}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Enhancing Data Parallelism of Fully Homomorphic Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {194--207}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_10}, doi = {10.1007/978-3-319-53177-9\_10}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MartinsS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengHL16, author = {Liqiang Peng and Lei Hu and Yao Lu}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Improved Results on Cryptanalysis of Prime Power {RSA}}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {287--303}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_15}, doi = {10.1007/978-3-319-53177-9\_15}, timestamp = {Sun, 10 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TangLMLG16, author = {Xiaoxiao Tang and Yu Liang and Xinjie Ma and Yan Lin and Debin Gao}, editor = {Seokhie Hong and Jong Hwan Park}, title = {On the Effectiveness of Code-Reuse-Based Android Application Obfuscation}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {333--349}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_18}, doi = {10.1007/978-3-319-53177-9\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TangLMLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangZ16, author = {Minqian Wang and Zhenfeng Zhang}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Expanded Framework for Dual System Encryption and Its Application}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {145--160}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_7}, doi = {10.1007/978-3-319-53177-9\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.