Information Security and Cryptology - ICISC 2023 [E-Book] : 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I / edited by Hwajeong Seo, Suhri Kim.
This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2023, held in Seoul, South Korea, during November 29-December 1, 2023 The 31 full papers included in this book were carefully revi...
Saved in:
Full text |
|
Personal Name(s): | Kim, Suhri, editor |
Seo, Hwajeong, editor | |
Edition: |
1st edition 2024. |
Imprint: |
Singapore :
Springer,
2024
|
Physical Description: |
XIV, 326 pages 94 illustrations, 60 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789819712359 |
DOI: |
10.1007/978-981-97-1235-9 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Computer Science ;
14561 |
Subject (LOC): |
- Cryptanalysis & Quantum Cryptanalysis
- Enhancing the Related-Key Security of PIPO through New Key Schedules
- Distinguisher and Related-Key Attack on HALFLOOP 96
- Revisiting Key Switching Techniques with Applications to Light-Key FHE
- Optimized Quantum Implementation of SEED
- Depth-Optimized Quantum Implementation of ARIA
- Finding Shortest Vector using Quantum NV Sieve on Grover
- Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator
- Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis
- Side Channel Attack
- Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages
- Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure
- A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
- Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Case Study of Kyber
- Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
- Signature Schemes
- 1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost
- Compact Identity-based Signature and Puncturable Signature from SQISign
- High Weight Code-based Signature Scheme from QC-LDPC Codes.