default search action
11. ICISC 2008: Seoul, Korea
- Pil Joong Lee, Jung Hee Cheon:
Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5461, Springer 2009, ISBN 978-3-642-00729-3
Public Key Encryption
- Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. 1-19 - Sascha Müller, Stefan Katzenbeisser, Claudia Eckert:
Distributed Attribute-Based Encryption. 20-36 - Santanu Sarkar, Subhamoy Maitra:
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. 37-51 - Reo Yoshida, Katsuyuki Takashima:
Simple Algorithms for Computing a Sequence of 2-Isogenies. 52-65
Key Management and Secret Sharing
- Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. 66-83 - Miyuki Uno, Mikio Kano:
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. 84-97
Privacy and Digital Rights
- Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol. 98-115 - Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. 116-133 - Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara:
Anonymous Fingerprinting for Predelivery of Contents. 134-151 - Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere:
Instruction Set Limitation in Support of Software Diversity. 152-165
Digital Signature and Voting
- Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee:
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. 166-183 - Pairat Thorncharoensri, Willy Susilo, Yi Mu:
How to Balance Privacy with Authenticity. 184-201 - Kun Peng, Feng Bao:
Efficient Vote Validity Check in Homomorphic Electronic Voting. 202-217
Side Channel Attack
- Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. 218-234 - Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar:
Novel PUF-Based Error Detection Methods in Finite State Machines. 235-252 - François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede:
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. 253-267
Hash and MAC
- Kan Yasuda:
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. 268-285 - Liting Zhang, Wenling Wu, Peng Wang:
Extended Models for Message Authentication. 286-301 - Yu Sasaki, Kazumaro Aoki:
A Preimage Attack for 52-Step HAS-160. 302-317
Primitives and Foundations
- Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi:
Essentially Optimal Universally Composable Oblivious Transfer. 318-335 - Ahmad-Reza Sadeghi, Thomas Schneider:
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. 336-353 - Soojin Cho, Manpyo Hong:
Proving a Shuffle Using Representations of the Symmetric Group. 354-367 - David Nowak:
On Formal Verification of Arithmetic-Based Cryptographic Primitives. 368-382
Block and Stream
- Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg:
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. 383-398 - Enes Pasalic:
Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. 399-414 - Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata:
Higher Order Differential Attacks on Reduced-Round MISTY1. 415-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.