


default search action
24th ICISC 2021: Seoul, South Korea
- Jong Hwan Park, Seung-Hyun Seo

:
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13218, Springer 2022, ISBN 978-3-031-08895-7
Cryptographic Protocol I
- Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki:

Revocable Hierarchical Identity-Based Authenticated Key Exchange. 3-27 - Gwangbae Choi, Serge Vaudenay:

Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. 28-47
Cryptographic Protocol II
- Pourandokht Behrouz

, Panagiotis Grontas
, Vangelis Konstantakatos
, Aris Pagourtzis
, Marianna Spyrakou
:
Designated-Verifier Linkable Ring Signatures. 51-70 - Snehil Joshi, Durgesh Pandey, Kannan Srinathan:

ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. 71-91
Cryptographic Protocol in Quantum Computer Age
- Robi Pedersen

, Osmanbey Uzunkol
:
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. 95-118 - Valeh Farzaliyev, Jan Willemson

, Jaan Kristjan Kaasik:
Improved Lattice-Based Mix-Nets for Electronic Voting. 119-136 - Peixin Ren, Xiaozhuo Gu:

Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. 137-156
Security Analysis
- Kazuki Yamamura, Yuntao Wang

, Eiichiro Fujisaki:
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. 159-174 - Oliver Braunsdorf

, Stefan Sessinghaus, Julian Horsch
:
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. 175-191
Security Analysis of Hash Algorithm
- Congming Wei, Chenhao Wu, Ximing Fu

, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. 195-216 - Yongseong Lee, Jinkeon Kang

, Donghoon Chang, Seokhie Hong:
A Preimage Attack on Reduced Gimli-Hash. 217-237
Security analysis of Symmetric Key Encryption Algorithm
- Matthew Beighton

, Harry Bartlett
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Algebraic Attacks on Grain-Like Keystream Generators. 241-270 - Jonghyun Park, Hangi Kim, Jongsung Kim:

Improved See-In-The-Middle Attacks on AES. 271-279
Fault and Side-Channel Attack
- Ravi Anand, Takanori Isobe:

Differential Fault Attack on Rocca. 283-295 - Seonghyuck Lim

, Jaeseung Han
, Taeho Lee
, Dong-Guk Han
:
Differential Fault Attack on Lightweight Block Cipher PIPO. 296-307 - Ji-Eun Woo

, Jaeseung Han
, Yeon-Jae Kim
, Hye-Won Mun
, Seonghyuck Lim
, Tae-Ho Lee
, Seong-Hyun An
, Soo-Jin Kim
, Dong-Guk Han
:
Learning-based Side-Channel Analysis on PIPO. 308-321
Constructions and Designs
- Shoichi Hirose

:
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. 325-338 - Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka

, Yusuke Yoshida, Keisuke Tanaka:
Forward Secure Message Franking. 339-358 - Lin Ding

, Zheng Wu:
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. 359-375
Quantum Circuit
- Jongheon Lee

, Sokjoon Lee
, You-Seok Lee
, Dooho Choi
:
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. 379-402 - Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong:

Efficient Quantum Circuit of Proth Number Modular Multiplication. 403-417
Efficient Implementation
- Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo

:
Grover on SM3. 421-433 - Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo

:
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. 434-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














