长垣产业园区科技文献服务平台

会议文集


文集名Information Security and Cryptology - ICISC 2018
会议名21st International Conference on Information Security and Cryptology (ICISC 2018)
中译名《第二十一届国际信息安全与密码学会议》
机构Korea Institute of Information Security and Cryptology (KIISC)
会议日期November 28-30, 2018
会议地点Seoul, South Korea
出版年2019
馆藏号329526


题名作者出版年
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based EncryptionTakeshi Koshiba; Katsuyuki Takashima2019
Mitigating the One-Use Restriction in Attribute-Based EncryptionLucas Kowalczyk; Jiahui Liu; Tal Malkin; Kailash Meiyappan2019
Attacking Noisy Secret CRT-RSA Exponents in Binary MethodKento Oonishi; Noboru Kunihiro2019
Compact Implementation of Modular Multiplication for Special Modulus on MSP430XHwajeong Seo; Kyuhwang An; Hyeokdong Kwon; Zhi Hu2019
Multi-identity IBFHE and Multi-attribute ABFHE in the Standard ModelXuecheng Ma; Dongdai Lin2019
Approximate Homomorphic Encryption over the Conjugate-Invariant RingDuhyeong Kim; Yongsoo Song2019
Excalibur Key-Generation Protocols for DAG Hierarchic DecryptionLouis Goubin; Geraldine Monsalve; Juan Reutter; Francisco Vial-Prado2019
The Six-Card Trick: Secure Computation of Three-Input EqualityKazumasa Shinagawa; Takaaki Mizuki2019
Unconditionally Secure Distributed Oblivious Polynomial EvaluationLouis Cianciullo; Hossein Ghodosi2019
An Efficient Private Evaluation of a Decision GraphHiroki Sudo; Koji Nuida; Kana Shimizu2019
Key Reuse Attack on NewHope Key Exchange ProtocolChao Liu; Zhongxiang Zheng; Guangnan Zou2019
Supersingular Isogeny Diffie - Hellman Authenticated Key ExchangeAtsushi Fujioka; Katsuyuki Takashima; Shintaro Terada; Kazuki Yoneyama2019
On the Complexity of the LWR-Solving BKW AlgorithmHiroki Okada; Atsushi Takayasu; Kazuhide Fukushima; Shinsaku Kiyomoto; Tsuyoshi Takagi2019
A Hierarchical Secret Sharing Scheme Based on Information Dispersal TechniquesKoji Shima; Hiroshi Doi2019
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean FunctionsRomar B. dela Cruz; Say Ol2019
A New Privacy-Preserving Searching Model on BlockchainMeiqi He; Gongxian Zeng; Jun Zhang; Linru Zhang; Yuechen Chen; SiuMing Yiu2019
ELSA: Efficient Long-Term Secure Storage of Large DatasetsMatthias Geihs; Johannes Buchmann2019
How to Block the Malicious Access to Android External StorageSisi Yuan; Yuewu Wang; Pingjian Wang; Lingguang Lei; Quan Zhou; Jun Li2019
A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy ApplicationsRadhakrishna Bhat; N. R. Sunitha2019
Practical Algebraic Side-Channel Attacks Against ACORNAlexandre Adomnicai; Laurent Masson; Jacques J. A. Fournier2019
12