Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2018.bht:"
@proceedings{DBLP:conf/icisc/2018, editor = {Kwangsu Lee}, title = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12146-4}, doi = {10.1007/978-3-030-12146-4}, isbn = {978-3-030-12145-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AdomnicaiMF18, author = {Alexandre Adomnicai and Laurent Masson and Jacques J. A. Fournier}, editor = {Kwangsu Lee}, title = {Practical Algebraic Side-Channel Attacks Against {ACORN}}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {325--340}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_20}, doi = {10.1007/978-3-030-12146-4\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AdomnicaiMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BhatS18, author = {Radhakrishna Bhat and N. R. Sunitha}, editor = {Kwangsu Lee}, title = {A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {304--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_19}, doi = {10.1007/978-3-030-12146-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BhatS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChouMM18, author = {Tung Chou and Yohei Maezawa and Atsuko Miyaji}, editor = {Kwangsu Lee}, title = {A Closer Look at the Guo-Johansson-Stankovski Attack Against {QC-MDPC} Codes}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {341--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_21}, doi = {10.1007/978-3-030-12146-4\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChouMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CianciulloG18, author = {Louis Cianciullo and Hossein Ghodosi}, editor = {Kwangsu Lee}, title = {Unconditionally Secure Distributed Oblivious Polynomial Evaluation}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {132--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_9}, doi = {10.1007/978-3-030-12146-4\_9}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CianciulloG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CruzO18, author = {Romar B. dela Cruz and Say Ol}, editor = {Kwangsu Lee}, title = {Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {233--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_15}, doi = {10.1007/978-3-030-12146-4\_15}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CruzO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FujiokaTTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama}, editor = {Kwangsu Lee}, title = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {177--195}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_12}, doi = {10.1007/978-3-030-12146-4\_12}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/FujiokaTTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Geihs018, author = {Matthias Geihs and Johannes Buchmann}, editor = {Kwangsu Lee}, title = {{\textbackslash}mathsf {ELSA} : Efficient Long-Term Secure Storage of Large Datasets}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {269--286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_17}, doi = {10.1007/978-3-030-12146-4\_17}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Geihs018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoubinMRP18, author = {Louis Goubin and Geraldine Monsalve and Juan L. Reutter and Francisco Jos{\'{e}} Vial Prado}, editor = {Kwangsu Lee}, title = {Excalibur Key-Generation Protocols for {DAG} Hierarchic Decryption}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {103--120}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_7}, doi = {10.1007/978-3-030-12146-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoubinMRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HeZZZCY18, author = {Meiqi He and Gongxian Zeng and Jun Zhang and Linru Zhang and Yuechen Chen and Siu{-}Ming Yiu}, editor = {Kwangsu Lee}, title = {A New Privacy-Preserving Searching Model on Blockchain}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {248--266}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_16}, doi = {10.1007/978-3-030-12146-4\_16}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HeZZZCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimS18, author = {Duhyeong Kim and Yongsoo Song}, editor = {Kwangsu Lee}, title = {Approximate Homomorphic Encryption over the Conjugate-Invariant Ring}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {85--102}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_6}, doi = {10.1007/978-3-030-12146-4\_6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KoshibaT18, author = {Takeshi Koshiba and Katsuyuki Takashima}, editor = {Kwangsu Lee}, title = {New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {3--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_1}, doi = {10.1007/978-3-030-12146-4\_1}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KoshibaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KowalczykLMM18, author = {Lucas Kowalczyk and Jiahui Liu and Tal Malkin and Kailash Meiyappan}, editor = {Kwangsu Lee}, title = {Mitigating the One-Use Restriction in Attribute-Based Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {23--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_2}, doi = {10.1007/978-3-030-12146-4\_2}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KowalczykLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuZZ18, author = {Chao Liu and Zhongxiang Zheng and Guangnan Zou}, editor = {Kwangsu Lee}, title = {Key Reuse Attack on NewHope Key Exchange Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {163--176}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_11}, doi = {10.1007/978-3-030-12146-4\_11}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LiuZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaL18, author = {Xuecheng Ma and Dongdai Lin}, editor = {Kwangsu Lee}, title = {Multi-identity {IBFHE} and Multi-attribute {ABFHE} in the Standard Model}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {69--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_5}, doi = {10.1007/978-3-030-12146-4\_5}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OkadaTFKT18, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Kwangsu Lee}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {196--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_13}, doi = {10.1007/978-3-030-12146-4\_13}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OonishiK18, author = {Kento Oonishi and Noboru Kunihiro}, editor = {Kwangsu Lee}, title = {Attacking Noisy Secret {CRT-RSA} Exponents in Binary Method}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {37--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_3}, doi = {10.1007/978-3-030-12146-4\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OonishiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SablotnyJJ18, author = {Martin Sablotny and Bj{\o}rn Sand Jensen and Chris W. Johnson}, editor = {Kwangsu Lee}, title = {Recurrent Neural Networks for Fuzz Testing Web Browsers}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {354--370}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_22}, doi = {10.1007/978-3-030-12146-4\_22}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SablotnyJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SeoAKH18, author = {Hwajeong Seo and Kyuhwang An and Hyeokdong Kwon and Zhi Hu}, editor = {Kwangsu Lee}, title = {Compact Implementation of Modular Multiplication for Special Modulus on {MSP430X}}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {55--66}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_4}, doi = {10.1007/978-3-030-12146-4\_4}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SeoAKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ShimaD18, author = {Koji Shima and Hiroshi Doi}, editor = {Kwangsu Lee}, title = {A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {217--232}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_14}, doi = {10.1007/978-3-030-12146-4\_14}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ShimaD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ShinagawaM18, author = {Kazumasa Shinagawa and Takaaki Mizuki}, editor = {Kwangsu Lee}, title = {The Six-Card Trick: Secure Computation of Three-Input Equality}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {123--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_8}, doi = {10.1007/978-3-030-12146-4\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ShinagawaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SudoNS18, author = {Hiroki Sudo and Koji Nuida and Kana Shimizu}, editor = {Kwangsu Lee}, title = {An Efficient Private Evaluation of a Decision Graph}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {143--160}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_10}, doi = {10.1007/978-3-030-12146-4\_10}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SudoNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YuanWWLZL18, author = {Sisi Yuan and Yuewu Wang and Pingjian Wang and Lingguang Lei and Quan Zhou and Jun Li}, editor = {Kwangsu Lee}, title = {How to Block the Malicious Access to Android External Storage}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {287--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_18}, doi = {10.1007/978-3-030-12146-4\_18}, timestamp = {Wed, 23 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YuanWWLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.