


default search action
21st ICISC 2018: Seoul, Korea
- Kwangsu Lee:
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11396, Springer 2019, ISBN 978-3-030-12145-7
Invited Talk
- Takeshi Koshiba
, Katsuyuki Takashima:
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption. 3-19
Public-Key Encryption and Implementation
- Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan:
Mitigating the One-Use Restriction in Attribute-Based Encryption. 23-36 - Kento Oonishi
, Noboru Kunihiro
:
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. 37-54 - Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Zhi Hu:
Compact Implementation of Modular Multiplication for Special Modulus on MSP430X. 55-66
Homomorphic Encryption
- Xuecheng Ma, Dongdai Lin:
Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. 69-84 - Duhyeong Kim
, Yongsoo Song
:
Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. 85-102 - Louis Goubin, Geraldine Monsalve, Juan L. Reutter
, Francisco José Vial Prado:
Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. 103-120
Secure Multiparty Computation
- Kazumasa Shinagawa, Takaaki Mizuki
:
The Six-Card Trick: Secure Computation of Three-Input Equality. 123-131 - Louis Cianciullo, Hossein Ghodosi:
Unconditionally Secure Distributed Oblivious Polynomial Evaluation. 132-142 - Hiroki Sudo
, Koji Nuida
, Kana Shimizu
:
An Efficient Private Evaluation of a Decision Graph. 143-160
Post-Quantum Cryptography
- Chao Liu, Zhongxiang Zheng, Guangnan Zou:
Key Reuse Attack on NewHope Key Exchange Protocol. 163-176 - Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama:
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange. 177-195 - Hiroki Okada
, Atsushi Takayasu
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. 196-214
Secret Sharing and Searchable Encryption
- Koji Shima, Hiroshi Doi:
A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. 217-232 - Romar B. dela Cruz
, Say Ol:
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions. 233-247 - Meiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen, Siu-Ming Yiu:
A New Privacy-Preserving Searching Model on Blockchain. 248-266
Storage Security and Information Retrieval
- Matthias Geihs, Johannes Buchmann:
\mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets. 269-286 - Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li:
How to Block the Malicious Access to Android External Storage. 287-303 - Radhakrishna Bhat
, N. R. Sunitha
:
A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. 304-321
Attacks and Software Security
- Alexandre Adomnicai
, Laurent Masson
, Jacques J. A. Fournier
:
Practical Algebraic Side-Channel Attacks Against ACORN. 325-340 - Tung Chou
, Yohei Maezawa, Atsuko Miyaji
:
A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes. 341-353 - Martin Sablotny
, Bjørn Sand Jensen, Chris W. Johnson:
Recurrent Neural Networks for Fuzz Testing Web Browsers. 354-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.