


default search action
27th ICISC 2024, Seoul, South Korea
- Jongsung Kim, Jungsoo Park, Wai-Kong Lee:

Information Security and Cryptology - ICISC 2024 - 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers. Lecture Notes in Computer Science 15596, Springer 2025, ISBN 978-981-96-5565-6
Cryptanalysis of Block Ciphers
- Bingqing Li, Ling Sun:

Exploring the Optimal Differential Characteristics of SM4 - Improving Automatic Search by Including Human Insights. 3-17 - Yuxuan Peng, Jinpeng Liu, Ling Sun:

Investigation of the Optimal Linear Characteristics of BAKSHEESH. 18-32
Signature Schemes
- Jiaming Wen

, Willy Susilo
, Yanhua Zhang, Fuchun Guo
, Huanguo Zhang:
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations. 35-55 - Hiroaki Anada

, Masayuki Fukumitsu
, Shingo Hasegawa
:
Tightly Secure Lattice-Based Synchronized Aggregate Signature in Standard Model. 56-70
Applied Cryptography
- Suryakant Prasad, Y. Sreenivasa Rao:

FineDReaM: A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism. 73-95 - Shoichi Hirose

, Kazuhiko Minematsu
:
A Formal Treatment of Envelope Encryption. 96-110 - Jae-yun Kim, Jieun Yun, Jung Hee Cheon, Saerom Park:

Efficient Privacy-Preserving Counting Method with Homomorphic Encryption. 111-137 - Junpei Yamaguchi, Tetsuya Izu, Noboru Kunihiro

:
Experimental Analysis of the Optimization-Based Factorization Algorithm. 138-154 - Kai Chen

, Yongqiang Li
, Ya Han
, Mingsheng Wang:
Fast Private Set Intersection from Polynomial Multiplication Triples. 155-180 - Jeewoo Jung, Taekyoung Kwon

:
Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation. 181-205
Quantum Cryptography and Deep Learning Based Analysis
- Rini Wisnu Wardhani

, Dedy Septono Catur Putranto
, Howon Kim
:
RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques. 209-230 - Gyeongju Song, Hwajeong Seo

:
Quantum Circuit for Curve25519 with Fewer Qubits. 231-243 - Dukyoung Kim, Kyoungbae Jang, Hyunji Kim, Yujin Oh, Seyoung Yoon, Hwajeong Seo:

CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography. 244-257
Side-Channel and Automotive Attack
- Joonsup Kim

, Dongjun Park
, GyuSang Kim
, Sujin Park
, Daehyeon Bae
, Heeseok Kim
, Seokhie Hong
:
REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis. 261-284 - Johannes von Richthofen, Christoph Krauß

, Johann Altgenug
, Dominik Spychalski
, Wolfgang Hommel
:
Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods. 285-310
Cyber Security
- Shohei Mita, Kazuki Yoneyama:

Simultaneous Multiplication Protocol Based on Packed Linear Secret Sharing and Its Applications. 313-328 - Wei-Jen Liao, Tao Ban

, Shin-Ming Cheng
, Takeshi Takahashi
:
Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs. 329-343 - Markus Dahlmanns

, Jan Pennekamp
, Robin Decker
, Klaus Wehrle
:
LUA-IoT: Let's Usably Authenticate the IoT. 344-378 - Mebae Ushida, Takeshi Miyamae, Takeru Fukuoka, Yoshiyuki Sakamaki, Yoshitomo Sakuma, Kota Miyake, Takuya Sakamoto:

An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. 379-400 - Guangcan Cui

, Lisheng Huang
, Fengjun Zhang
, Zuoyuan Niu, Kai Shi, Yunhai Lan
:
Malicious Node Identification Based on Behavioral Statistical Features and Social Relationships. 401-422 - Suryakant Prasad, Y. Sreenivasa Rao:

LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System. 423-440
AI Security
- Wenwu Xu, Pengyi Wu, Peng Wang, Guoqiao Zhou, Lidong Zhai:

Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities. 443-464 - Harry Chandra Tanuwidjaja

, Tao Ban
, Takeshi Takahashi
, Tsung-Nan Lin
, Boyi Lee
, Muhamad Erza Aminanto
:
Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS. 465-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














