


default search action
26th ICISC 2023, Seoul, South Korea - Part I
- Hwajeong Seo

, Suhri Kim
:
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14561, Springer 2024, ISBN 978-981-97-1234-2
Cryptanalysis and Quantum Cryptanalysis
- Seungjun Baek

, Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Enhancing the Related-Key Security of PIPO Through New Key Schedules. 3-18 - Jinpeng Liu, Ling Sun:

Distinguisher and Related-Key Attack on HALFLOOP-96. 19-40 - Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang:

Revisiting Key Switching Techniques with Applications to Light-Key FHE. 41-64 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:

Optimized Quantum Implementation of SEED. 65-78 - Yujin Yang

, Kyungbae Jang
, Yujin Oh
, Hwajeong Seo
:
Depth-Optimized Quantum Implementation of ARIA. 79-96 - Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwang-il Bae, Il Kwon Sohn, Hwajeong Seo:

Finding Shortest Vector Using Quantum NV Sieve on Grover. 97-118 - Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:

Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator. 119-139 - Rini Wisnu Wardhani

, Dedy Septono Catur Putranto
, Howon Kim
:
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis. 140-160
Side Channel Attack
- Shunsuke Osaki

, Noboru Kunihiro
:
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. 163-184 - Keon-Hee Choi

, Ju-Hwan Kim
, Jaeseung Han
, Jae-Won Huh
, Dong-Guk Han
:
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure. 185-201 - Yen-Ting Kuo

, Atsushi Takayasu
:
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis. 202-220 - Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen, Haotong Xu:

Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber. 221-239 - Yan Yan, Elisabeth Oswald, Arnab Roy:

Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test. 240-258
Signature Schemes
- Masayuki Tezuka

, Keisuke Tanaka:
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost. 261-281 - Surbhi Shaw

, Ratna Dutta:
Compact Identity-Based Signature and Puncturable Signature from SQISign. 282-305 - Chik How Tan

, Theo Fanuela Prabowo
:
High Weight Code-Based Signature Scheme from QC-LDPC Codes. 306-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














