Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2016.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2016,
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-53177-9},
  doi          = {10.1007/978-3-319-53177-9},
  isbn         = {978-3-319-53176-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AcharyaD16,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Adaptively Secure Broadcast Encryption with Dealership},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {161--177},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_8},
  doi          = {10.1007/978-3-319-53177-9\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/AcharyaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AliC16,
  author       = {Shoukat Ali and
                  Murat Cenk},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {A New Algorithm for Residue Multiplication Modulo 2521-1},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {181--193},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_9},
  doi          = {10.1007/978-3-319-53177-9\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AliC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangDXX16,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu and
                  Rui Xue},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Network Coding Signature Schemes Against Related-Key Attacks in the
                  Random Oracle Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {239--253},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_13},
  doi          = {10.1007/978-3-319-53177-9\_13},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangDXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CheonHKLS16,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Jinsu Kim and
                  Changmin Lee and
                  Yongha Son},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {A Practical Post-Quantum Public-Key Cryptosystem Based on {\textbackslash}textsf
                  spLWE},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {51--74},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_3},
  doi          = {10.1007/978-3-319-53177-9\_3},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CheonHKLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DebnathD16,
  author       = {Sumit Kumar Debnath and
                  Ratna Dutta},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {New Realizations of Efficient and Secure Private Set Intersection
                  Protocols Preserving Fairness},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {254--284},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_14},
  doi          = {10.1007/978-3-319-53177-9\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DebnathD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DuW16,
  author       = {Yusong Du and
                  Baodian Wei},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {On Computing the Immunity of Boolean Power Functions Against Fast
                  Algebraic Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {304--316},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_16},
  doi          = {10.1007/978-3-319-53177-9\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DuongPWT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Revisiting the Cubic {UOV} Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {223--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_12},
  doi          = {10.1007/978-3-319-53177-9\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DuongPWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FengCGFF16,
  author       = {Jingyi Feng and
                  Hua Chen and
                  Si Gao and
                  Limin Fan and
                  Dengguo Feng},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Improved Fault Analysis on the Block Cipher {SPECK} by Injecting Faults
                  in the Same Round},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {317--332},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_17},
  doi          = {10.1007/978-3-319-53177-9\_17},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/FengCGFF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GiustolisiGAH16,
  author       = {Rosario Giustolisi and
                  Christian Gehrmann and
                  Markus Ahlstr{\"{o}}m and
                  Simon Holmberg},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {A Secure Group-Based {AKA} Protocol for Machine-Type Communications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {3--27},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_1},
  doi          = {10.1007/978-3-319-53177-9\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GiustolisiGAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HuthAGDG16,
  author       = {Christopher Huth and
                  Aydin Aysu and
                  Jorge Guajardo and
                  Paul Duplys and
                  Tim G{\"{u}}neysu},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Secure and Private, yet Lightweight, Authentication for the IoT via
                  {PUF} and {CBKA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {28--48},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_2},
  doi          = {10.1007/978-3-319-53177-9\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HuthAGDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KhandakerONSD16,
  author       = {Md. Al{-}Amin Khandaker and
                  Hirotaka Ono and
                  Yasuyuki Nogami and
                  Masaaki Shirase and
                  Sylvain Duquesne},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {An Improvement of Optimal Ate Pairing on {KSS} Curve with Pseudo 12-Sparse
                  Multiplication},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {208--219},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_11},
  doi          = {10.1007/978-3-319-53177-9\_11},
  timestamp    = {Fri, 29 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KhandakerONSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimPKJHJR16,
  author       = {Jeongsu Kim and
                  Suyong Park and
                  Seonggeun Kim and
                  Busik Jang and
                  Sang Geun Hahn and
                  Sangim Jung and
                  Dongyoung Roh},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Analysis of Error Terms of Signatures Based on Learning with Errors},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {75--97},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_4},
  doi          = {10.1007/978-3-319-53177-9\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimPKJHJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Lee16,
  author       = {Kwangsu Lee},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Transforming Hidden Vector Encryption Schemes from Composite to Prime
                  Order Groups},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {101--125},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_5},
  doi          = {10.1007/978-3-319-53177-9\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Lee16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuLLX16,
  author       = {Yamin Liu and
                  Xianhui Lu and
                  Bao Li and
                  Haiyang Xue},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Lossy Key Encapsulation Mechanism and Its Applications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {126--144},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_6},
  doi          = {10.1007/978-3-319-53177-9\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuLLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MartinsS16,
  author       = {Paulo Martins and
                  Leonel Sousa},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Enhancing Data Parallelism of Fully Homomorphic Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {194--207},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_10},
  doi          = {10.1007/978-3-319-53177-9\_10},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MartinsS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengHL16,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Improved Results on Cryptanalysis of Prime Power {RSA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {287--303},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_15},
  doi          = {10.1007/978-3-319-53177-9\_15},
  timestamp    = {Sun, 10 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TangLMLG16,
  author       = {Xiaoxiao Tang and
                  Yu Liang and
                  Xinjie Ma and
                  Yan Lin and
                  Debin Gao},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {On the Effectiveness of Code-Reuse-Based Android Application Obfuscation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {333--349},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_18},
  doi          = {10.1007/978-3-319-53177-9\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TangLMLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangZ16,
  author       = {Minqian Wang and
                  Zhenfeng Zhang},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Expanded Framework for Dual System Encryption and Its Application},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {145--160},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_7},
  doi          = {10.1007/978-3-319-53177-9\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}