


default search action
18. ICISC 2015: Seoul, Korea
- Soonhak Kwon, Aaram Yun:

Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9558, Springer 2016, ISBN 978-3-319-30839-5
Digital Signatures
- David Derler

, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
:
A General Framework for Redactable Signatures and New Constructions. 3-19 - Hiraku Morita

, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. 20-35 - Hiroaki Anada, Seiko Arita, Kouichi Sakurai:

Attribute-Based Two-Tier Signatures: Definition and Construction. 36-49
Public-Key Cryptography
- Benjamin Wesolowski, Pascal Junod

:
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. 53-68 - Özgür Dagdelen, Sebastian Gajek, Florian Göpfert:

Learning with Errors in the Exponent. 69-84
Block Cipher Cryptanalysis
- Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
:
Higher-Order Cryptanalysis of LowMC. 87-101 - Huiling Zhang, Wenling Wu, Yanfeng Wang:

Integral Attack Against Bit-Oriented Block Ciphers. 102-118 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya

:
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. 119-135 - Ning Wang, Xiaoyun Wang, Keting Jia:

Improved Impossible Differential Attack on Reduced-Round LBlock. 136-152
Elliptic Curve Cryptography
- Koray Karabina:

Point Decomposition Problem in Binary Elliptic Curves. 155-168 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:

Faster ECC over F2521-1 (feat. NEON). 169-181
Protocols
- Maki Yoshida, Satoshi Obana:

On the (In)Efficiency of Non-Interactive Secure Multiparty Computation. 185-193 - Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang

:
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. 194-209 - Seth Gilbert

, Xiao Liu, Haifeng Yu:
On Differentially Private Online Collaborative Recommendation Systems. 210-226
Security
- Yu Liang, Xinjie Ma, Daoyuan Wu

, Xiaoxiao Tang, Debin Gao
, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. 229-245 - Maksim O. Shudrak, Vyacheslav V. Zolotarev:

Improving Fuzzing Using Software Complexity Metrics. 246-261 - Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis:

Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. 262-277 - Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. 278-293
Side-Channel Attacks
- Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:

Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. 297-313 - Tomoyuki Tanigaki, Noboru Kunihiro

:
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. 314-328 - HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee

, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. 329-342
Physical Unclonable Functions
- Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:

Let Me Prove It to You: RO PUFs Are Provably Learnable. 345-358 - Lukasz Krzywiecki

:
Anonymous Authentication Scheme Based on PUF. 359-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














