Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi |
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 117-136, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Laurane Marco, Abdullah Talayhan, Serge Vaudenay |
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 173-192, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Furue, Yasuhiko Ikematsu |
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 101-116, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati, Stefano Zanero |
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 16-35, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Max Cartor, Ryann Cartor, Mark Lewis, Daniel Smith-Tone |
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 137-151, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Bénédikt Tran, Serge Vaudenay |
Extractable Witness Encryption for the Homogeneous Linear Equations Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 152-172, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphael R. Toledo |
aPlonK: Aggregated PlonK from Multi-polynomial Commitment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 195-213, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Junji Shikata, Hiroki Kuzuno (eds.) |
Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-031-41325-4 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jiahao Zhao, Nana Zhang, Qianqian Yang 0003, Ling Song 0001, Lei Hu |
Improved Boomerang Attacks on Deoxys-BC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 59-76, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Giraud, David Naccache |
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 3-15, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Koji Nuida |
Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 237-254, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata |
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 77-97, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Julien Béguinot, Wei Cheng 0003, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry |
Reliability of Ring Oscillator PUFs with Reduced Helper Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 36-56, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hyeonbum Lee, Jae Hong Seo |
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 214-234, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Hand, Alexander Koch 0001, Pascal Lafourcade 0001, Daiki Miyahara, Léo Robert |
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings, pp. 255-272, 2023, Springer, 978-3-031-41325-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi |
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 85-104, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi |
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 147-165, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Edoardo Persichetti, Tovohery Randrianarisoa |
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 24-44, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hirotomo Shinoki, Koji Nuida |
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 189-207, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo |
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 166-186, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda |
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 107-127, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Nariyasu Heseri, Koji Nuida |
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 208-223, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 66-84, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang |
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 3-23, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Sihao Shen, Zhenzhen Li, Wei Song 0002 |
Methods of Extracting Parameters of the Processor Caches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 47-65, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chen-Mou Cheng, Mitsuaki Akiyama (eds.) |
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-031-15254-2 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Daiza, Kazuki Yoneyama |
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 128-144, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, Takaaki Mizuki |
Card-Based Secure Sorting Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings, pp. 224-240, 2022, Springer, 978-3-031-15254-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Changze Yin, Yacheng Wang, Tsuyoshi Takagi |
(Short Paper) Simple Matrix Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 227-237, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi |
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 23-41, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura |
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 77-96, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yasuhiko Ikematsu, Satoshi Nakamura 0004, Masaya Yasuda |
A Trace Map Attack Against Special Ring-LWE Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 3-22, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yasufumi Hashimoto |
Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 137-150, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Daiza, Kaoru Kurosawa |
Optimum Attack on 3-Round Feistel-2 Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 175-192, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Masuda, Yukiyoshi Kameyama |
FFT Program Generation for Ring LWE-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 151-171, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 45-63, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Koji Hamasaki, Hitoshi Hohjo |
Moving Target Defense for the CloudControl Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 241-251, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Ryo Nojima (eds.) |
Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-030-85986-2 The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jason T. LeGrow, Aaron Hutchinson |
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 216-226, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi |
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 64-73, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini |
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 195-215, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki |
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 119-133, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba 0001, Mitsuaki Akiyama, Masayuki Murata 0001 |
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings, pp. 99-118, 2021, Springer, 978-3-030-85986-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yui Tajiri, Mamoru Mimura |
Detection of Malicious PowerShell Using Word-Level Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 39-56, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sergii Banin, Geir Olav Dyrkolbotn |
Detection of Running Malware Before it Becomes Malicious. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 57-73, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kota Sasaki, Koji Nuida |
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 77-94, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hailun Yan, Serge Vaudenay |
Symmetric Asynchronous Ratcheted Communication with Associated Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 184-204, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yoshitatsu Matsuda |
Optimization of Search Space for Finding Very Short Lattice Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 149-161, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada |
Model Extraction Oriented Data Publishing with k-anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 218-236, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Serge Vaudenay |
Sublinear Bounds on the Distinguishing Advantage for Multiple Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 165-183, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Kurek |
Efficient Forward-Secure Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 239-260, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Akira Kanaoka (eds.) |
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-030-58207-4 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Sarkar, Yu Sasaki, Siang Meng Sim |
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 3-22, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuichiro Dan, Toshiki Shibahara, Junko Takahashi |
Timing Attack on Random Forests for Generating Adversarial Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 285-302, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Onuki, Tsuyoshi Takagi |
On Collisions Related to an Ideal Class of Order 3 in CSIDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 131-148, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 97-116, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Sugawara 0001, Tatsuya Onuma, Yang Li 0001 |
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 117-127, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara |
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 23-36, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kai Kinoshita, Koutarou Suzuki |
Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 261-281, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Waseda, Ryo Nojima |
On Limitation of Plausible Deniability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings, pp. 207-217, 2020, Springer, 978-3-030-58207-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abigail Koay, Ian Welch, Winston K. G. Seah |
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 207-217, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu |
A New Approach to Constructing Digital Signature Schemes - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 363-373, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sergii Banin, Geir Olav Dyrkolbotn |
Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 149-167, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Toi Tomita, Wakaha Ogata, Kaoru Kurosawa |
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 3-22, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Takeshi Yagi (eds.) |
Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-030-26833-6 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Evangelos Mantas, Constantinos Patsakis |
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 377-390, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami |
How to Solve Multiple Short-Exponent Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 53-64, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Okishima, Toru Nakanishi 0001 |
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 89-106, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fukang Liu, Takanori Isobe 0001 |
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 306-326, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001 |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 129-145, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Kirill Morozov |
VSS Made Simpler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 329-342, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fukang Liu, Zhenfu Cao, Gaoli Wang |
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 287-305, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Guillaume Dumas, Pascal Lafourcade 0001, Julio López Fenner, David Lucas 0001, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys |
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 67-88, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xin Wang, Shimin Li, Rui Xue 0001 |
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 273-283, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann |
API Usability of Stateful Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 221-240, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi |
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 23-33, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura |
IDS Alert Priority Determination Based on Traffic Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 189-206, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | F. Betül Durak, Serge Vaudenay |
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 343-362, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Ito, Naoyuki Shinohara, Shigenori Uchiyama |
An Efficient F_4 -style Based Algorithm to Solve MQ Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 37-52, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mamoru Mimura, Taro Ohminami |
Towards Efficient Detection of Malicious VBA Macros with LSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 168-185, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Yuki Funabiki, Takanori Isobe 0001 |
More Results on Shortest Linear Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 109-128, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi |
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 241-250, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard |
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 391-409, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura |
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 253-272, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang 0001 |
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 244-261, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 227-243, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi |
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 3-18, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Shi, Kazuki Yoneyama |
Verification of LINE Encryption Version 1.0 Using ProVerif. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 158-173, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Wiemers, Dominik Klein 0001 |
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 51-67, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Tada, Akinaga Ueda, Kaoru Kurosawa |
How to Prove KDM Security of BHHO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 281-296, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Qiuping Li, Baofeng Wu, Zhuojun Liu |
Lightweight Recursive MDS Matrices with Generalized Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 262-278, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chen Qian 0002, Mehdi Tibouchi, Rémi Géraud |
Universal Witness Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 313-329, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada |
Detecting Privacy Information Abuse by Android Apps from API Call Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 143-157, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pauline Bert, Adeline Roux-Langlois |
From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 297-312, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Akinaga Ueda, Hayato Tada, Kaoru Kurosawa |
(Short Paper) How to Solve DLOG Problem with Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 104-113, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Koji Shima, Hiroshi Doi |
XOR-Based Hierarchical Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 206-223, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki |
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 68-83, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Iguchi, Taro Uematsu, Tatsuro Fujii |
The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 174-189, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Atsuo Inomata, Kan Yasuda (eds.) |
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![Springer, 978-3-319-97915-1 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki |
(Short Paper) Parameter Trade-Offs for NFS and ECM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 114-123, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|