Accepted Papers
These papers are listed in order of submission.
Security Definitions on Time-Lock Puzzles
Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka
Tokyo Institute of Technology
Generative Adversarial Networks based Pseudo-Random Number Generator for Embedded Processors
Hyunji Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo
Hansung University
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo, Reza Azarderakhsh
Hansung University, Florida Atlantic University
A Sub-linear Lattice-based Submatrix Commitment
Huang Lin, Yuguang Fang
Mercury's Wing & Suterusu project, University of Florida
(Quantum) Cryptanalysis of Misty schemes
Aline Gouget, Jacques Patarin, Ambre Toulemonde
Thales DIS, University of Versailles
Can a Differential AttackWork for an Arbitrarily Large Number of Rounds?
Nicolas Courtois, Jean-Jacques Quisquater
University College London, UCL DICE/Crypto Group
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
Kookmin University, Hansung University, Korea University, Jeonbuk National University
Federated Learning in Side-Channel Analysis
Huanyu Wang, Elena Dubrova
KTH Royal Institute of Technology
Key Mismatch Attack on ThreeBears, Frodo and Round5
Jan Vacek, Jan Václavek
Thales
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
The University of Tokyo, Mitsubishi Electric Corporation
A New Non-random Property of 4.5-Round PRINCE
Bolin Wang, Chan Song, Wenling Wu, Lei Zhang
Institute of Software Chinese Academy of Sciences
Efficient Implementation of SHA-3 Hash Function on 8-bit AVR-based Sensor Nodes
Youngbeom Kim, Hojin Choi, Seog Chung Seo
Kookmin University
A RDBMS-based Bitcoin Analysis System
Hyunsu Mun, Youngseok Lee, Soohyun Kim
Chungnam National University
Secret Sharing with Statistical Privacy and Computational Relaxed Non-Malleability
Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka
Tokyo Institute of Technology, NTT Secure Platform Laboratories
Differential Fault based Key Recovery Attacks on TRIAD
Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau
Xiamen University Malaysia
Download : Consent_To_Publish
Download : ICISC Presentation Template
Download : Presentation Guidlines