default search action
24th ICISC 2021: Seoul, South Korea
- Jong Hwan Park, Seung-Hyun Seo:
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13218, Springer 2022, ISBN 978-3-031-08895-7
Cryptographic Protocol I
- Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki:
Revocable Hierarchical Identity-Based Authenticated Key Exchange. 3-27 - Gwangbae Choi, Serge Vaudenay:
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. 28-47
Cryptographic Protocol II
- Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou:
Designated-Verifier Linkable Ring Signatures. 51-70 - Snehil Joshi, Durgesh Pandey, Kannan Srinathan:
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. 71-91
Cryptographic Protocol in Quantum Computer Age
- Robi Pedersen, Osmanbey Uzunkol:
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. 95-118 - Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved Lattice-Based Mix-Nets for Electronic Voting. 119-136 - Peixin Ren, Xiaozhuo Gu:
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. 137-156
Security Analysis
- Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki:
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. 159-174 - Oliver Braunsdorf, Stefan Sessinghaus, Julian Horsch:
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. 175-191
Security Analysis of Hash Algorithm
- Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. 195-216 - Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A Preimage Attack on Reduced Gimli-Hash. 217-237
Security analysis of Symmetric Key Encryption Algorithm
- Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Algebraic Attacks on Grain-Like Keystream Generators. 241-270 - Jonghyun Park, Hangi Kim, Jongsung Kim:
Improved See-In-The-Middle Attacks on AES. 271-279
Fault and Side-Channel Attack
- Ravi Anand, Takanori Isobe:
Differential Fault Attack on Rocca. 283-295 - Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han:
Differential Fault Attack on Lightweight Block Cipher PIPO. 296-307 - Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han:
Learning-based Side-Channel Analysis on PIPO. 308-321
Constructions and Designs
- Shoichi Hirose:
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. 325-338 - Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Forward Secure Message Franking. 339-358 - Lin Ding, Zheng Wu:
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. 359-375
Quantum Circuit
- Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi:
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. 379-402 - Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong:
Efficient Quantum Circuit of Proth Number Modular Multiplication. 403-417
Efficient Implementation
- Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo:
Grover on SM3. 421-433 - Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo:
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. 434-444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.