ISC C

31 papers

YearTitle / Authors
2015Automatic Search for Linear Trails of the SPECK Family.
Yuan Yao, Bin Zhang, Wenling Wu
2015Bit Error Probability Evaluation of RO PUFs.
Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing
2015Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model.
Masayuki Fukumitsu, Shingo Hasegawa
2015CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency.
Zhiwei Wang, Siu-Ming Yiu
2015Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Aggelos Kiayias, Ozgur Oksuz, Qiang Tang
2015Dynamically Provisioning Isolation in Hierarchical Architectures.
Kevin Falzon, Eric Bodden
2015Efficient Ephemeral Elliptic Curve Cryptographic Keys.
Andrea Miele, Arjen K. Lenstra
2015Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan
2015Extracting Robust Keys from NAND Flash Physical Unclonable Functions.
Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji
2015Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine
2015From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour.
Pierre Karpman
2015GPU-Disasm: A GPU-Based X86 Disassembler.
Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, Georgios Portokalidis
2015General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015Graded Signatures.
Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
2015Hashing into Jacobi Quartic Curves.
Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian
2015Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images.
Anu Aryal, Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki
2015Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Javier López, Chris J. Mitchell
2015Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes.
Massimo Chenal, Qiang Tang
2015Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures.
Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao
2015Multi-user Searchable Encryption in the Cloud.
Cédric Van Rompay, Refik Molva, Melek Önen
2015Multipath TCP IDS Evasion and Mitigation.
Zeeshan Afzal, Stefan Lindskog
2015Oblivious PAKE: Efficient Handling of Password Trials.
Franziskus Kiefer, Mark Manulis
2015On Security of a White-Box Implementation of SHARK.
Yang Shi, Hongfei Fan
2015On the Efficiency of Multi-party Contract Signing Protocols.
Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou
2015On the Provable Security of the Dragonfly Protocol.
Jean Lancrenon, Marjan Skrobot
2015Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage.
Xinyu Fan, Vijay Varadharajan, Michael Hitchens
2015Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer
2015Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter.
Sumit Kumar Debnath, Ratna Dutta
2015Software Security Maturity in Public Organisations.
Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad
2015The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
Bei Liang, Hongda Li, Jinyong Chang
2015Two Generic Methods of Analyzing Stream Ciphers.
Lin Jiao, Bin Zhang, Mingsheng Wang