×

Information security and cryptology – ICISC 2023. 26th international conference on information security and cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023. Revised selected papers. Part I. (English) Zbl 1539.68033

Lecture Notes in Computer Science 14561. Singapore: Springer (ISBN 978-981-971234-2/pbk; 978-981-971235-9/ebook). xiv, 326 p. (2024).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1517.68028]. For Part II of selected papers of the present conference see [Zbl 1539.68034].
Indexed articles:
Baek, Seungjun; Kim, Giyoon; Jeon, Yongjin; Kim, Jongsung, Enhancing the related-key security of PIPO through new key schedules, 3-18 [Zbl 07857806]
Liu, Jinpeng; Sun, Ling, Distinguisher and related-key attack on HALFLOOP-96, 19-40 [Zbl 07857807]
Wang, Ruida; Li, Zhihao; Wei, Benqiang; Chen, Chunling; Lu, Xianhui; Wang, Kunpeng, Revisiting key switching techniques with applications to light-key FHE, 41-64 [Zbl 07857808]
Oh, Yujin; Jang, Kyungbae; Yang, Yujin; Seo, Hwajeong, Optimized quantum implementation of SEED, 65-78 [Zbl 07857809]
Yang, Yujin; Jang, Kyungbae; Oh, Yujin; Seo, Hwajeong, Depth-optimized quantum implementation of ARIA, 79-96 [Zbl 07857810]
Kim, Hyunji; Jang, Kyoungbae; Oh, Yujin; Seok, Woojin; Lee, Wonhuck; Bae, Kwangil; Sohn, Ilkwon; Seo, Hwajeong, Finding shortest vector using quantum NV sieve on Grover, 97-118 [Zbl 07857811]
Yamaguchi, Junpei; Yamazaki, Masafumi; Tabuchi, Akihiro; Honda, Takumi; Izu, Tetsuya; Kunihiro, Noboru, Experiments and resource analysis of Shor’s factorization using a quantum simulator, 119-139 [Zbl 07857812]
Wardhani, Rini Wisnu; Putranto, Dedy Septono Catur; Kim, Howon, Quantum circuits for high-degree and half-multiplication for post-quantum analysis, 140-160 [Zbl 07857813]
Osaki, Shunsuke; Kunihiro, Noboru, Extended attacks on ECDSA with noisy multiple bit nonce leakages, 163-184 [Zbl 07857814]
Choi, Keon-Hee; Kim, Ju-Hwan; Han, Jaeseung; Huh, Jae-Won; Han, Dong-Guk, Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure, 185-201 [Zbl 07857815]
Kuo, Yen-Ting; Takayasu, Atsushi, A lattice attack on CRYSTALS-Kyber with correlation power analysis, 202-220 [Zbl 07857816]
Ma, Yuan; Yang, Xinyue; Wang, An; Wei, Congming; Chen, Tianyu; Xu, Haotong, Side-channel analysis on lattice-based KEM using multi-feature recognition – the case study of Kyber, 221-239 [Zbl 07857817]
Yan, Yan; Oswald, Elisabeth; Roy, Arnab, Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test, 240-258 [Zbl 07857818]
Tezuka, Masayuki; Tanaka, Keisuke, 1-out-of-\(n\) oblivious signatures: security revisited and a generic construction with an efficient communication cost, 261-281 [Zbl 07857819]
Shaw, Surbhi; Dutta, Ratna, Compact identity-based signature and puncturable signature from SQISign, 282-305 [Zbl 07857820]
Tan, Chik How; Prabowo, Theo Fanuela, High weight code-based signature scheme from QC-LDPC codes, 306-323 [Zbl 07857821]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68M25 Computer security
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI