Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2018.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2018,
  editor       = {Kwangsu Lee},
  title        = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12146-4},
  doi          = {10.1007/978-3-030-12146-4},
  isbn         = {978-3-030-12145-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AdomnicaiMF18,
  author       = {Alexandre Adomnicai and
                  Laurent Masson and
                  Jacques J. A. Fournier},
  editor       = {Kwangsu Lee},
  title        = {Practical Algebraic Side-Channel Attacks Against {ACORN}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_20},
  doi          = {10.1007/978-3-030-12146-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AdomnicaiMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BhatS18,
  author       = {Radhakrishna Bhat and
                  N. R. Sunitha},
  editor       = {Kwangsu Lee},
  title        = {A Novel Tamper Evident Single Database Information-Theoretic Private
                  Information Retrieval for User Privacy Applications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {304--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_19},
  doi          = {10.1007/978-3-030-12146-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BhatS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChouMM18,
  author       = {Tung Chou and
                  Yohei Maezawa and
                  Atsuko Miyaji},
  editor       = {Kwangsu Lee},
  title        = {A Closer Look at the Guo-Johansson-Stankovski Attack Against {QC-MDPC}
                  Codes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {341--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_21},
  doi          = {10.1007/978-3-030-12146-4\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChouMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CianciulloG18,
  author       = {Louis Cianciullo and
                  Hossein Ghodosi},
  editor       = {Kwangsu Lee},
  title        = {Unconditionally Secure Distributed Oblivious Polynomial Evaluation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {132--142},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_9},
  doi          = {10.1007/978-3-030-12146-4\_9},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CianciulloG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CruzO18,
  author       = {Romar B. dela Cruz and
                  Say Ol},
  editor       = {Kwangsu Lee},
  title        = {Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean
                  Functions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_15},
  doi          = {10.1007/978-3-030-12146-4\_15},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CruzO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FujiokaTTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Shintaro Terada and
                  Kazuki Yoneyama},
  editor       = {Kwangsu Lee},
  title        = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_12},
  doi          = {10.1007/978-3-030-12146-4\_12},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/FujiokaTTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Geihs018,
  author       = {Matthias Geihs and
                  Johannes Buchmann},
  editor       = {Kwangsu Lee},
  title        = {{\textbackslash}mathsf {ELSA} : Efficient Long-Term Secure Storage
                  of Large Datasets},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {269--286},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_17},
  doi          = {10.1007/978-3-030-12146-4\_17},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Geihs018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoubinMRP18,
  author       = {Louis Goubin and
                  Geraldine Monsalve and
                  Juan L. Reutter and
                  Francisco Jos{\'{e}} Vial Prado},
  editor       = {Kwangsu Lee},
  title        = {Excalibur Key-Generation Protocols for {DAG} Hierarchic Decryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {103--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_7},
  doi          = {10.1007/978-3-030-12146-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoubinMRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HeZZZCY18,
  author       = {Meiqi He and
                  Gongxian Zeng and
                  Jun Zhang and
                  Linru Zhang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Kwangsu Lee},
  title        = {A New Privacy-Preserving Searching Model on Blockchain},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_16},
  doi          = {10.1007/978-3-030-12146-4\_16},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HeZZZCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimS18,
  author       = {Duhyeong Kim and
                  Yongsoo Song},
  editor       = {Kwangsu Lee},
  title        = {Approximate Homomorphic Encryption over the Conjugate-Invariant Ring},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_6},
  doi          = {10.1007/978-3-030-12146-4\_6},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KoshibaT18,
  author       = {Takeshi Koshiba and
                  Katsuyuki Takashima},
  editor       = {Kwangsu Lee},
  title        = {New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based
                  Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_1},
  doi          = {10.1007/978-3-030-12146-4\_1},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KoshibaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KowalczykLMM18,
  author       = {Lucas Kowalczyk and
                  Jiahui Liu and
                  Tal Malkin and
                  Kailash Meiyappan},
  editor       = {Kwangsu Lee},
  title        = {Mitigating the One-Use Restriction in Attribute-Based Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {23--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_2},
  doi          = {10.1007/978-3-030-12146-4\_2},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KowalczykLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuZZ18,
  author       = {Chao Liu and
                  Zhongxiang Zheng and
                  Guangnan Zou},
  editor       = {Kwangsu Lee},
  title        = {Key Reuse Attack on NewHope Key Exchange Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {163--176},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_11},
  doi          = {10.1007/978-3-030-12146-4\_11},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaL18,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  editor       = {Kwangsu Lee},
  title        = {Multi-identity {IBFHE} and Multi-attribute {ABFHE} in the Standard
                  Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_5},
  doi          = {10.1007/978-3-030-12146-4\_5},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OkadaTFKT18,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Kwangsu Lee},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_13},
  doi          = {10.1007/978-3-030-12146-4\_13},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OonishiK18,
  author       = {Kento Oonishi and
                  Noboru Kunihiro},
  editor       = {Kwangsu Lee},
  title        = {Attacking Noisy Secret {CRT-RSA} Exponents in Binary Method},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_3},
  doi          = {10.1007/978-3-030-12146-4\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OonishiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SablotnyJJ18,
  author       = {Martin Sablotny and
                  Bj{\o}rn Sand Jensen and
                  Chris W. Johnson},
  editor       = {Kwangsu Lee},
  title        = {Recurrent Neural Networks for Fuzz Testing Web Browsers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {354--370},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_22},
  doi          = {10.1007/978-3-030-12146-4\_22},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SablotnyJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SeoAKH18,
  author       = {Hwajeong Seo and
                  Kyuhwang An and
                  Hyeokdong Kwon and
                  Zhi Hu},
  editor       = {Kwangsu Lee},
  title        = {Compact Implementation of Modular Multiplication for Special Modulus
                  on {MSP430X}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_4},
  doi          = {10.1007/978-3-030-12146-4\_4},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SeoAKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ShimaD18,
  author       = {Koji Shima and
                  Hiroshi Doi},
  editor       = {Kwangsu Lee},
  title        = {A Hierarchical Secret Sharing Scheme Based on Information Dispersal
                  Techniques},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_14},
  doi          = {10.1007/978-3-030-12146-4\_14},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ShimaD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ShinagawaM18,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki},
  editor       = {Kwangsu Lee},
  title        = {The Six-Card Trick: Secure Computation of Three-Input Equality},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {123--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_8},
  doi          = {10.1007/978-3-030-12146-4\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ShinagawaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SudoNS18,
  author       = {Hiroki Sudo and
                  Koji Nuida and
                  Kana Shimizu},
  editor       = {Kwangsu Lee},
  title        = {An Efficient Private Evaluation of a Decision Graph},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {143--160},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_10},
  doi          = {10.1007/978-3-030-12146-4\_10},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SudoNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YuanWWLZL18,
  author       = {Sisi Yuan and
                  Yuewu Wang and
                  Pingjian Wang and
                  Lingguang Lei and
                  Quan Zhou and
                  Jun Li},
  editor       = {Kwangsu Lee},
  title        = {How to Block the Malicious Access to Android External Storage},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {287--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_18},
  doi          = {10.1007/978-3-030-12146-4\_18},
  timestamp    = {Wed, 23 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YuanWWLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics