ICISC 2014, the 17th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 3–5, 2014. This year the conference was hosted by …
G Samid - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The prevailing ciphers rely on the weak assumption that their attacker is not smarter than expected by their designers. The resultant crypto ecology favors the cryptographic …
R Kuang, N Bettenburg - 2020 IEEE international conference on …, 2020 - ieeexplore.ieee.org
The One-time-pad (OTP) was mathematically proven to be perfectly secure by Shannon in 1949. We propose to extend the classical OTP from an n-bit finite field to the entire …
S Li, LD Xu - Securing the Internet of Things, 2017 - books.google.com
In this chapter, we will introduce the secrecy and secret-key in the Internet of Things (IoT). We clarify the ways of secret-key generation that the IoT differs from the web application and …
C Portmann, K Tanaka - IEICE transactions on fundamentals of …, 2011 - search.ieice.org
We analyze the security notion of information-theoretic secrecy against an adversary who can make< mos00099. jpg> adaptive queries to the decryption oracle, and show that it is …
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in …
S Qing, E Okamoto, K Kim, D Liu - 2016 - books.google.com
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in …
J Callas - Information Systems Security, 2007 - Taylor & Francis
We've seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of …