Information Security and Cryptology - ICISC 2023
Information Security and Cryptology - ICISC 2023
26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II
Kim, Suhri; Seo, Hwajeong
Springer Verlag, Singapore
03/2024
308
Mole
Inglês
9789819712373
15 a 20 dias
for building SGX applications.- BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols.- mdTLS: How to make middlebox-aware TLS more efficient?.- PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing.- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras.- Applied Cryptography.- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.- Leakage-Resilient Attribute-based Encryption with Attribute-hiding.- Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.- Single-Shuffle Card-Based Protocols with Six Cards per Gate.- Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.- Finsler Encryption.- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set.- Korean Post Quantum Cryptography.- Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation.- Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator.- On the security of REDOG.
for building SGX applications.- BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols.- mdTLS: How to make middlebox-aware TLS more efficient?.- PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing.- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras.- Applied Cryptography.- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.- Leakage-Resilient Attribute-based Encryption with Attribute-hiding.- Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.- Single-Shuffle Card-Based Protocols with Six Cards per Gate.- Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.- Finsler Encryption.- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set.- Korean Post Quantum Cryptography.- Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation.- Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator.- On the security of REDOG.