


default search action
11. ICISC 2008: Seoul, Korea
- Pil Joong Lee, Jung Hee Cheon:

Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5461, Springer 2009, ISBN 978-3-642-00729-3
Public Key Encryption
- Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. 1-19 - Sascha Müller, Stefan Katzenbeisser, Claudia Eckert:

Distributed Attribute-Based Encryption. 20-36 - Santanu Sarkar

, Subhamoy Maitra:
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. 37-51 - Reo Yoshida, Katsuyuki Takashima:

Simple Algorithms for Computing a Sequence of 2-Isogenies. 52-65
Key Management and Secret Sharing
- Jihye Kim

, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. 66-83 - Miyuki Uno, Mikio Kano:

Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. 84-97
Privacy and Digital Rights
- Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert

, Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol. 98-115 - Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini

, Rasool Jalili:
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. 116-133 - Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara:

Anonymous Fingerprinting for Predelivery of Contents. 134-151 - Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere:

Instruction Set Limitation in Support of Software Diversity. 152-165
Digital Signature and Voting
- Kwangsu Lee

, Jung Yeon Hwang, Dong Hoon Lee:
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. 166-183 - Pairat Thorncharoensri

, Willy Susilo
, Yi Mu:
How to Balance Privacy with Authenticity. 184-201 - Kun Peng, Feng Bao:

Efficient Vote Validity Check in Homomorphic Electronic Voting. 202-217
Side Channel Attack
- Svetla Nikova

, Vincent Rijmen
, Martin Schläffer:
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. 218-234 - Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar:

Novel PUF-Based Error Detection Methods in Finite State Machines. 235-252 - François-Xavier Standaert

, Benedikt Gierlichs, Ingrid Verbauwhede
:
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. 253-267
Hash and MAC
- Kan Yasuda:

A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. 268-285 - Liting Zhang, Wenling Wu, Peng Wang

:
Extended Models for Message Authentication. 286-301 - Yu Sasaki, Kazumaro Aoki:

A Preimage Attack for 52-Step HAS-160. 302-317
Primitives and Foundations
- Ivan Damgård, Jesper Buus Nielsen

, Claudio Orlandi
:
Essentially Optimal Universally Composable Oblivious Transfer. 318-335 - Ahmad-Reza Sadeghi, Thomas Schneider

:
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. 336-353 - Soojin Cho, Manpyo Hong:

Proving a Shuffle Using Representations of the Symmetric Group. 354-367 - David Nowak:

On Formal Verification of Arithmetic-Based Cryptographic Primitives. 368-382
Block and Stream
- Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg:

A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. 383-398 - Enes Pasalic

:
Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. 399-414 - Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata:

Higher Order Differential Attacks on Reduced-Round MISTY1. 415-431

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














