ICISC 2018 ACCEPTED PAPERS

  • ELSA: Efficient Long-Term Secure Storage of Large Datasets

Matthias Geihs and Johannes Buchmann.

  • Multi-Identity IBFHE and Multi-Attribute ABFHE in the Standard Model

Xuecheng Ma and Dongdai Lin.

  • The Six-Card Trick: Secure Computation of Three-Input Equality

Kazumasa Shinagawa and Takaaki Mizuki.

  • Practical Algebraic Side-Channel Attacks on ACORN

Alexandre Adomnicai, Jacques Fournier and Laurent Masson.

  • Compact Implementation of Modular Multiplication for Special Modulus on MSP430X Case Study: NIST P-256

Hwajeong Seo, Hyeokdong Kwon, Kyuhwang An and Zhi Hu.

  • A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques

Koji Shima and Hiroshi Doi.

  • Unconditionally Secure Distributed Oblivious Polynomial Evaluation

Louis Cianciullo and Hossein Ghodosi.

  • Mitigating the One-Use Restriction in Attribute-Based Encryption

Lucas Kowalczyk, Jiahui Liu, Tal Malkin and Kailash Meiyappan.

  • Key reuse attack on NewHope key exchange protocol

Chao Liu, Zhongxiang Zheng and Guangnan Zou.

  • Supersingular Isogeny Diffie--Hellman Authenticated Key Exchange

Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada and Kazuki Yoneyama.

  • Approximate Homomorphic Encryption over the Conjugate-invariant Ring

Duhyeong Kim and Yongsoo Song.

  • A Closer Look at the Guo–Johansson–Stankovski Attack Against QC-MDPC Codes

Tung Chou, Yohei Maezawa and Atsuko Miyaji.

  • How to Block the Malicious Access to Android External Storage

Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou and Jun Li.

  • On the Complexity of the LWR-Solving BKW Algorithm

Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto and Tsuyoshi Takagi.

  • Attacking Noisy Secret CRT-RSA Exponents in Binary Method

Kento Oonishi and Noboru Kunihiro.

  • An efficient private evaluation of a decision graph

Hiroki Sudo, Koji Nuida and Kana Shimizu.

  • Recurrent neural networks for fuzz testing web browsers

Martin Sablotny, Bjørn S. Jensen and Chris W. Johnson.

  • Cheating-immune secret sharing schemes from Maiorana-McFarland Boolean functions

Romar Dela Cruz and Say Ol.

  • Excalibur Key-Generation Protocols For DAG Hierarchic Decryption

Francisco José Vial-Prado, Geraldine Monsalve, Juan Reutter and Louis Goubin.

  • A new privacy-preserving searching model on blockchain

Meiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen and Siu Ming Yiu.

  • A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications

Radhakrishna Bhat and N R Sunitha.