Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2022.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2022,
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29371-9},
  doi          = {10.1007/978-3-031-29371-9},
  isbn         = {978-3-031-29370-2},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AhmedS22,
  author       = {Mohammad Nabil Ahmed and
                  Kana Shimizu},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Private Evaluation of a Decision Tree Based on Secret Sharing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {171--194},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_9},
  doi          = {10.1007/978-3-031-29371-9\_9},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AhmedS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlatawiS22,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End
                  Encryption Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {100--123},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_6},
  doi          = {10.1007/978-3-031-29371-9\_6},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlatawiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AnastasovaAKB22,
  author       = {Mila Anastasova and
                  Reza Azarderakhsh and
                  Mehran Mozaffari Kermani and
                  Lubjana Beshaj},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Time-Efficient Finite Field Microarchitecture Design for Curve448
                  and Ed448 on Cortex-M4},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {292--314},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_15},
  doi          = {10.1007/978-3-031-29371-9\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AnastasovaAKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BaeCPKS22,
  author       = {Seungyeon Bae and
                  Yousung Chang and
                  Hyeongjin Park and
                  Minseo Kim and
                  Youngjoo Shin},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {A Performance Evaluation of IPsec with Post-Quantum Cryptography},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {249--266},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_13},
  doi          = {10.1007/978-3-031-29371-9\_13},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BaeCPKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BossertLL22,
  author       = {Jannis Bossert and
                  Eik List and
                  Stefan Lucks},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Implicit Key-Stretching Security of Encryption Schemes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {17--40},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_2},
  doi          = {10.1007/978-3-031-29371-9\_2},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BossertLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChaumLY22,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {WOTSwana: {A} Generalized \emph{S}\({}_{\mbox{ leeve }}\) Construction
                  for Multiple Proofs of Ownership},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {491--511},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_24},
  doi          = {10.1007/978-3-031-29371-9\_24},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChaumLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenGGLWWX22,
  author       = {Shiyao Chen and
                  Chun Guo and
                  Jian Guo and
                  Li Liu and
                  Meiqin Wang and
                  Puwen Wei and
                  Zeyu Xu},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum
                  Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_3},
  doi          = {10.1007/978-3-031-29371-9\_3},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenGGLWWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DevehatHS22,
  author       = {Ana{\"{e}}lle Le D{\'{e}}v{\'{e}}hat and
                  Shingo Hasegawa and
                  Hiroki Shizuya},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical
                  Gaussian Sampler},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {472--490},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_23},
  doi          = {10.1007/978-3-031-29371-9\_23},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DevehatHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HuhH22,
  author       = {Jae{-}Won Huh and
                  Dong{-}Guk Han},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Differential Fault Attack on {AES} Using Maximum Four Bytes Faulty
                  Ciphertexts},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {235--245},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_12},
  doi          = {10.1007/978-3-031-29371-9\_12},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HuhH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IshizakaF22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Attribute-Based Signatures for Range of Inner Product and Its Applications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {382--407},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_19},
  doi          = {10.1007/978-3-031-29371-9\_19},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IshizakaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IshizakaFK22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Trapdoor Sanitizable and Redactable Signatures with Unlinkability,
                  Invisibility and Strong Context-Hiding},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {337--362},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_17},
  doi          = {10.1007/978-3-031-29371-9\_17},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IshizakaFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataYT22,
  author       = {Ichiro Iwata and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary
                  Fields},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {435--449},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_21},
  doi          = {10.1007/978-3-031-29371-9\_21},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JinAK22,
  author       = {Hoyong Jin and
                  Dohyeon An and
                  Taekyoung Kwon},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Differential Testing of Cryptographic Libraries with Hybrid Fuzzing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {124--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_7},
  doi          = {10.1007/978-3-031-29371-9\_7},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JinAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Larangeira22,
  author       = {Mario Larangeira},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Reputation at Stake! {A} Trust Layer over Decentralized Ledger for
                  Multiparty Computation and Reputation-Fair Lottery},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {195--215},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_10},
  doi          = {10.1007/978-3-031-29371-9\_10},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Larangeira22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuCTTM22,
  author       = {Zi{-}Yuan Liu and
                  Chu{-}Chieh Chien and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Public Key Encryption with Hierarchical Authorized Keyword Search},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {147--170},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_8},
  doi          = {10.1007/978-3-031-29371-9\_8},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuCTTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkHLK22,
  author       = {Leo Hyun Park and
                  Eunbi Hwang and
                  Donggun Lee and
                  Taekyoung Kwon},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Towards Constructing Consistent Pattern Strength Meters with User's
                  Visual Perception},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {81--99},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_5},
  doi          = {10.1007/978-3-031-29371-9\_5},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkHLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkK22,
  author       = {Jonghyun Park and
                  Jongsung Kim},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {See-In-The-Middle Attacks on Blockciphers {ARIA} and {DEFAULT}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_1},
  doi          = {10.1007/978-3-031-29371-9\_1},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SatoS22,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Identity-based Interactive Aggregate Signatures from Lattices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {408--432},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_20},
  doi          = {10.1007/978-3-031-29371-9\_20},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SatoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SatoSM22,
  author       = {Shingo Sato and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Group Testing Aggregate Signatures with Soundness},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {363--381},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_18},
  doi          = {10.1007/978-3-031-29371-9\_18},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SatoSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SeckCDDCCG22,
  author       = {Boly Seck and
                  Pierre{-}Louis Cayrel and
                  Idy Diop and
                  Vlad{-}Florin Dragoi and
                  Kalen Couzon and
                  Brice Colombier and
                  Vincent Grosso},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Key-Recovery by Side-Channel Information on the Matrix-Vector Product
                  in Code-Based Cryptosystems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_11},
  doi          = {10.1007/978-3-031-29371-9\_11},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SeckCDDCCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TezukaT22,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_16},
  doi          = {10.1007/978-3-031-29371-9\_16},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TezukaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangND22,
  author       = {Ruize Wang and
                  Kalle Ngo and
                  Elena Dubrova},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated
                  {EM} Emanations},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {450--471},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_22},
  doi          = {10.1007/978-3-031-29371-9\_22},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangND22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWM22,
  author       = {Li Zhang and
                  Wenling Wu and
                  Yongxia Mao},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_4},
  doi          = {10.1007/978-3-031-29371-9\_4},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhengL22,
  author       = {Jianliang Zheng and
                  Jie Li},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {An Ultrafast Cryptographically Secure Pseudorandom Number Generator},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {267--291},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_14},
  doi          = {10.1007/978-3-031-29371-9\_14},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhengL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}