


default search action
12. ICISC 2009: Seoul, Korea
- Dong Hoon Lee, Seokhie Hong:

Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5984, Springer 2010, ISBN 978-3-642-14422-6
Key Management and Key Exchange
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis

:
Generic One Round Group Key Exchange in the Standard Model. 1-15 - Mark Manulis

, Koutarou Suzuki, Berkant Ustaoglu
:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. 16-33 - Georg Lippold, Colin Boyd, Juan Manuel González Nieto:

Efficient Certificateless KEM in the Standard Model. 34-46
Public Key Cryptography
- Yumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa:

Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing. 47-64 - Eric Brier, David Naccache, Mehdi Tibouchi

:
Factoring Unbalanced Moduli with Known Bits. 65-72
Algebraic Cryptanalysis and Stream Cipher
- Jeremy Erickson, Jintai Ding

, Chris Christensen:
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. 73-86 - Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding

, Johannes Buchmann, Stanislav Bulygin:
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. 87-100 - Joo Yeon Cho, Miia Hermelin:

Improved Linear Cryptanalysis of SOSEMANUK. 101-117
Security Management and E?cient Implementation
- Aivo Jürgenson, Jan Willemson:

Serial Model for Attack Tree Computations. 118-128 - Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar:

Lightweight Cryptography and RFID: Tackling the Hidden Overheads. 129-145
Side Channel Attack
- Amir Moradi

, Thomas Eisenbarth
, Axel Poschmann, Christof Paar:
Power Analysis of Single-Rail Storage Elements as Used in MDPL. 146-160 - Abdulhadi Shoufan

, Falko Strenzke, H. Gregor Molter
, Marc Stöttinger
:
A Timing Attack against Patterson Algorithm in the McEliece PKC. 161-175 - Johann Großschädl, Elisabeth Oswald

, Dan Page, Michael Tunstall
:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. 176-192
Privacy Enhanced Technology
- Helger Lipmaa

:
First CPIR Protocol with Data-Dependent Computation. 193-210 - Qingsong Ye, Ron Steinfeld, Josef Pieprzyk

, Huaxiong Wang:
Efficient Fuzzy Matching and Intersection on Private Datasets. 211-228 - Ahmad-Reza Sadeghi, Thomas Schneider

, Immo Wehrenberg:
Efficient Privacy-Preserving Face Recognition. 229-244
Cryptographic Protocol
- Tord Ingolf Reistad, Tomas Toft:

Linear, Constant-Rounds Bit-Decomposition. 245-257 - Nikita Borisov

, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka
:
Attacking and Repairing the Improved ModOnions Protocol. 258-273 - Alessandro Sorniotti, Refik Molva

:
Secret Handshakes with Revocation Support. 274-299
Cryptanalysis of Hash Function
- Shuang Wu, Dengguo Feng, Wenling Wu:

Practical Rebound Attack on 12-Round Cheetah-256. 300-314 - Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon:

Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. 315-331 - Deukjo Hong, Bonwook Koo, Yu Sasaki:

Improved Preimage Attack for 68-Step HAS-160. 332-348 - Siyuan Qiao, Wei Wang, Keting Jia:

Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. 349-361
Network Security
- Madeline González Muñiz, Rainer Steinwandt:

Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. 362-373 - Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young Ik Eom:

Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. 374-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














