default search action
23rd ICISC 2020: Seoul, Korea
- Deukjo Hong:
Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12593, Springer 2021, ISBN 978-3-030-68889-9
Security Models
- Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Security Definitions on Time-Lock Puzzles. 3-15 - Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka:
Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability. 16-39
Cryptography in Quantum Computer Age
- Aline Gouget, Jacques Patarin, Ambre Toulemonde:
(Quantum) Cryptanalysis of Misty Schemes. 43-57 - Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. 58-84
Constructions and Designs
- Huang Lin:
A Sub-linear Lattice-Based Submatrix Commitment Scheme. 87-98 - Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. 99-122
Efficient Implementations
- Hwajeong Seo, Reza Azarderakhsh:
Curve448 on 32-Bit ARM Cortex-M4. 125-139 - YoungBeom Kim, Hojin Choi, Seog Chung Seo:
Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor Nodes. 140-154
Security Analysis
- Nicolas T. Courtois, Jean-Jacques Quisquater:
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? 157-181 - Jan Vacek, Jan Václavek:
Key Mismatch Attack on ThreeBears, Frodo and Round5. 182-198 - Bolin Wang, Chan Song, Wenling Wu, Lei Zhang:
A New Non-random Property of 4.5-Round PRINCE. 199-212
Artificial Intelligence and Cryptocurrency
- Hyunji Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo:
Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors. 215-234 - Hyunsu Mun, Soohyun Kim, Youngseok Lee:
A RDBMS-Based Bitcoin Analysis Method. 235-253
Fault and Side-Channel Attack
- Huanyu Wang, Elena Dubrova:
Federated Learning in Side-Channel Analysis. 257-272 - Md. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau:
Differential Fault Based Key Recovery Attacks on TRIAD. 273-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.