


default search action
14. ICISC 2011: Seoul, Korea
- Howon Kim:

Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7259, Springer 2012, ISBN 978-3-642-31911-2
Hash Function I
- Yu Sasaki, Kazumaro Aoki:

Improved Integral Analysis on Tweaked Lesamnta. 1-17 - Thorsten Ernst Schilling

, Håvard Raddum
:
Analysis of Trivium Using Compressed Right Hand Side Equations. 18-32 - Florian Mendel

, Tomislav Nad, Martin Schläffer:
Cryptanalysis of Round-Reduced HAS-160. 33-47
Side Channel Analysis I
- Daehyun Strobel, Christof Paar:

An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. 48-60 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:

An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. 61-73 - Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon:

Correcting Errors in Private Keys Obtained from Cold Boot Attacks. 74-87
Public Key Cryptography
- Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:

Strong Security Notions for Timed-Release Public-Key Encryption Revisited. 88-108 - Song Luo, Qingni Shen, Zhong Chen:

Fully Secure Unidirectional Identity-Based Proxy Re-encryption. 109-126
Network and Mobile Security
- Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng:

Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition. 127-139 - Kai Chen, Yifeng Lian, Yingjun Zhang:

AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. 140-154
Digital Signature
- Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert:

Weaknesses in Current RSA Signature Schemes. 155-168 - Shuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen:

Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations. 169-185
Side Channel Analysis II
- Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. 186-203 - Laila El Aimani

:
Generic Constructions for Verifiable Signcryption. 204-218 - Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du:

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. 219-234
Cryptanalysis
- Kyung Chul Jeong

, Dong Hoon Lee, Daewan Han:
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. 235-247 - Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:

Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. 248-260 - Yusong Du, Fangguo Zhang

, Meicheng Liu:
On the Resistance of Boolean Functions against Fast Algebraic Attacks. 261-274 - Yu Chen, Liqun Chen

, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. 275-301
Efficient Implementation
- Marko Wolf

, Timo Gendrullis:
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. 302-318 - Jothi Rangasamy

, Douglas Stebila
, Lakshmi Kuppusamy
, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. 319-331 - Paolo Palmieri

, Olivier Pereira:
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. 332-345
Hash Function II
- Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:

Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. 346-364 - Deukjo Hong, Bonwook Koo, Daesung Kwon:

Biclique Attack on the Full HIGHT. 365-374 - Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:

Preimage Attacks on Step-Reduced SM3 Hash Function. 375-390
Cryptographic Application
- Vu Duc Nguyen, Yang-Wai Chow

, Willy Susilo
:
Breaking a 3D-Based CAPTCHA Scheme. 391-405 - Fangming Zhao, Takashi Nishide, Kouichi Sakurai:

Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. 406-418 - Zhenfei Zhang, Thomas Plantard

, Willy Susilo
:
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. 419-436 - Teruya Minamoto

, Ryuji Ohura:
A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic. 437-449
Cryptographic Protocol
- Ashish Choudhury

, Arpita Patra:
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. 450-466 - Kazuki Yoneyama:

Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles. 467-489 - Atsushi Fujioka, Koutarou Suzuki:

Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys. 490-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














