


default search action
24th ICISC 2021: Seoul, South Korea
- Jong Hwan Park, Seung-Hyun Seo
:
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13218, Springer 2022, ISBN 978-3-031-08895-7
Cryptographic Protocol I
- Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki:
Revocable Hierarchical Identity-Based Authenticated Key Exchange. 3-27 - Gwangbae Choi, Serge Vaudenay:
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. 28-47
Cryptographic Protocol II
- Pourandokht Behrouz
, Panagiotis Grontas
, Vangelis Konstantakatos
, Aris Pagourtzis
, Marianna Spyrakou
:
Designated-Verifier Linkable Ring Signatures. 51-70 - Snehil Joshi, Durgesh Pandey, Kannan Srinathan:
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. 71-91
Cryptographic Protocol in Quantum Computer Age
- Robi Pedersen
, Osmanbey Uzunkol
:
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. 95-118 - Valeh Farzaliyev, Jan Willemson
, Jaan Kristjan Kaasik:
Improved Lattice-Based Mix-Nets for Electronic Voting. 119-136 - Peixin Ren, Xiaozhuo Gu:
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. 137-156
Security Analysis
- Kazuki Yamamura, Yuntao Wang
, Eiichiro Fujisaki:
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. 159-174 - Oliver Braunsdorf
, Stefan Sessinghaus, Julian Horsch
:
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. 175-191
Security Analysis of Hash Algorithm
- Congming Wei, Chenhao Wu, Ximing Fu
, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. 195-216 - Yongseong Lee, Jinkeon Kang
, Donghoon Chang, Seokhie Hong:
A Preimage Attack on Reduced Gimli-Hash. 217-237
Security analysis of Symmetric Key Encryption Algorithm
- Matthew Beighton
, Harry Bartlett
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Algebraic Attacks on Grain-Like Keystream Generators. 241-270 - Jonghyun Park, Hangi Kim, Jongsung Kim:
Improved See-In-The-Middle Attacks on AES. 271-279
Fault and Side-Channel Attack
- Ravi Anand, Takanori Isobe:
Differential Fault Attack on Rocca. 283-295 - Seonghyuck Lim
, Jaeseung Han
, Taeho Lee
, Dong-Guk Han
:
Differential Fault Attack on Lightweight Block Cipher PIPO. 296-307 - Ji-Eun Woo
, Jaeseung Han
, Yeon-Jae Kim
, Hye-Won Mun
, Seonghyuck Lim
, Tae-Ho Lee
, Seong-Hyun An
, Soo-Jin Kim
, Dong-Guk Han
:
Learning-based Side-Channel Analysis on PIPO. 308-321
Constructions and Designs
- Shoichi Hirose
:
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. 325-338 - Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka
, Yusuke Yoshida, Keisuke Tanaka:
Forward Secure Message Franking. 339-358 - Lin Ding
, Zheng Wu:
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. 359-375
Quantum Circuit
- Jongheon Lee
, Sokjoon Lee
, You-Seok Lee
, Dooho Choi
:
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. 379-402 - Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong:
Efficient Quantum Circuit of Proth Number Modular Multiplication. 403-417
Efficient Implementation
- Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
:
Grover on SM3. 421-433 - Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
:
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. 434-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.