default search action
26th ICISC 2023, Seoul, South Korea - Part II
- Hwajeong Seo, Suhri Kim:
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14562, Springer 2024, ISBN 978-981-97-1237-3
Cyber Security
- Heekyung Shin, Jiwon Ock, Hyeon No, Seongmin Kim:
A Comparative Analysis of Rust-Based SGX Frameworks: Implications for Building SGX Applications. 3-19 - Min Jang, Yuna Hwang, Yonghwi Kwon, Hyoungshick Kim:
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols. 20-38 - Taehyun Ahn, Jiwon Kwak, Seungjoo Kim:
mdTLS: How to Make Middlebox-Aware TLS More Efficient? 39-59 - Seyeon Jeong, Eunbi Hwang, Yeongpil Cho, Taekyoung Kwon:
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing. 60-80 - Yeon-Ji Lee, Na-Eun Park, Il-Gu Lee:
Lightweight Anomaly Detection Mechanism Based on Machine Learning Using Low-Cost Surveillance Cameras. 81-92
Applied Cryptography
- Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han, Shijie Jia:
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test. 95-112 - Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang:
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. 113-132 - Shun Uchizono, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners. 133-156 - Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
Single-Shuffle Card-Based Protocols with Six Cards per Gate. 157-169 - Takumi Amada, Mitsugu Iwamoto, Yohei Watanabe:
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy. 170-193 - Tetsuya Nagano, Hiroaki Anada:
Finsler Encryption. 194-213 - Zhenzhen Li, Zihan Xue, Wei Song:
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets. 214-232
Korean Post Quantum Cryptography
- Kwangjo Kim:
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation. 235-260 - Suhri Kim, Eunmin Lee, Joohee Lee, Minju Lee, Hyuna Noh:
Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator. 261-281 - Tanja Lange, Alex Pellegrini, Alberto Ravagnani:
On the security of REDOG. 282-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.