default search action
26th ICISC 2023, Seoul, South Korea - Part I
- Hwajeong Seo, Suhri Kim:
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14561, Springer 2024, ISBN 978-981-97-1234-2
Cryptanalysis and Quantum Cryptanalysis
- Seungjun Baek, Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Enhancing the Related-Key Security of PIPO Through New Key Schedules. 3-18 - Jinpeng Liu, Ling Sun:
Distinguisher and Related-Key Attack on HALFLOOP-96. 19-40 - Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang:
Revisiting Key Switching Techniques with Applications to Light-Key FHE. 41-64 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Optimized Quantum Implementation of SEED. 65-78 - Yujin Yang, Kyungbae Jang, Yujin Oh, Hwajeong Seo:
Depth-Optimized Quantum Implementation of ARIA. 79-96 - Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwang-il Bae, Il Kwon Sohn, Hwajeong Seo:
Finding Shortest Vector Using Quantum NV Sieve on Grover. 97-118 - Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator. 119-139 - Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim:
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis. 140-160
Side Channel Attack
- Shunsuke Osaki, Noboru Kunihiro:
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. 163-184 - Keon-Hee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh, Dong-Guk Han:
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure. 185-201 - Yen-Ting Kuo, Atsushi Takayasu:
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis. 202-220 - Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen, Haotong Xu:
Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber. 221-239 - Yan Yan, Elisabeth Oswald, Arnab Roy:
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test. 240-258
Signature Schemes
- Masayuki Tezuka, Keisuke Tanaka:
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost. 261-281 - Surbhi Shaw, Ratna Dutta:
Compact Identity-Based Signature and Puncturable Signature from SQISign. 282-305 - Chik How Tan, Theo Fanuela Prabowo:
High Weight Code-Based Signature Scheme from QC-LDPC Codes. 306-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.