default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2016
- Soonhak Kwon, Aaram Yun:
Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9558, Springer 2016, ISBN 978-3-319-30839-5 [contents] - 2015
- Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. ICISC 2015: 119-135 - Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Attribute-Based Two-Tier Signatures: Definition and Construction. ICISC 2015: 36-49 - Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. ICISC 2015: 297-313 - Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang:
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. ICISC 2015: 194-209 - Özgür Dagdelen, Sebastian Gajek, Florian Göpfert:
Learning with Errors in the Exponent. ICISC 2015: 69-84 - David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. ICISC 2015: 3-19 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. ICISC 2015: 87-101 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. ICISC 2015: 345-358 - Seth Gilbert, Xiao Liu, Haifeng Yu:
On Differentially Private Online Collaborative Recommendation Systems. ICISC 2015: 210-226 - HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. ICISC 2015: 329-342 - Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. ICISC 2015: 155-168 - Lukasz Krzywiecki:
Anonymous Authentication Scheme Based on PUF. ICISC 2015: 359-372 - Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. ICISC 2015: 229-245 - Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. ICISC 2015: 20-35 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). ICISC 2015: 169-181 - Maksim O. Shudrak, Vyacheslav V. Zolotarev:
Improving Fuzzing Using Software Complexity Metrics. ICISC 2015: 246-261 - Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. ICISC 2015: 278-293 - Tomoyuki Tanigaki, Noboru Kunihiro:
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. ICISC 2015: 314-328 - Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis:
Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. ICISC 2015: 262-277 - Ning Wang, Xiaoyun Wang, Keting Jia:
Improved Impossible Differential Attack on Reduced-Round LBlock. ICISC 2015: 136-152 - Benjamin Wesolowski, Pascal Junod:
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. ICISC 2015: 53-68 - Maki Yoshida, Satoshi Obana:
On the (In)Efficiency of Non-Interactive Secure Multiparty Computation. ICISC 2015: 185-193 - Huiling Zhang, Wenling Wu, Yanfeng Wang:
Integral Attack Against Bit-Oriented Block Ciphers. ICISC 2015: 102-118
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-06 12:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint