


default search action
26th ICISC 2023, Seoul, South Korea - Part II
- Hwajeong Seo

, Suhri Kim
:
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14562, Springer 2024, ISBN 978-981-97-1237-3
Cyber Security
- Heekyung Shin, Jiwon Ock, Hyeon No, Seongmin Kim:

A Comparative Analysis of Rust-Based SGX Frameworks: Implications for Building SGX Applications. 3-19 - Min Jang, Yuna Hwang, Yonghwi Kwon, Hyoungshick Kim:

BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols. 20-38 - Taehyun Ahn

, Jiwon Kwak
, Seungjoo Kim
:
mdTLS: How to Make Middlebox-Aware TLS More Efficient? 39-59 - Seyeon Jeong

, Eunbi Hwang, Yeongpil Cho, Taekyoung Kwon:
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing. 60-80 - Yeon-Ji Lee

, Na-Eun Park
, Il-Gu Lee
:
Lightweight Anomaly Detection Mechanism Based on Machine Learning Using Low-Cost Surveillance Cameras. 81-92
Applied Cryptography
- Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han, Shijie Jia:

Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test. 95-112 - Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang:

Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. 113-132 - Shun Uchizono, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:

Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners. 133-156 - Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:

Single-Shuffle Card-Based Protocols with Six Cards per Gate. 157-169 - Takumi Amada, Mitsugu Iwamoto, Yohei Watanabe:

Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy. 170-193 - Tetsuya Nagano, Hiroaki Anada:

Finsler Encryption. 194-213 - Zhenzhen Li, Zihan Xue, Wei Song:

Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets. 214-232
Korean Post Quantum Cryptography
- Kwangjo Kim:

Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation. 235-260 - Suhri Kim, Eunmin Lee, Joohee Lee

, Minju Lee, Hyuna Noh:
Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator. 261-281 - Tanja Lange, Alex Pellegrini, Alberto Ravagnani:

On the security of REDOG. 282-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














