Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Weiyao Wang 0004, Yuntao Wang 0002, Atsushi Takayasu, Tsuyoshi Takagi |
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Terry Shue Chien Lau, Chik How Tan |
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Louis Cianciullo, Hossein Ghodosi |
Improvements to Almost Optimum Secret Sharing with Cheating Detection. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma |
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren |
Is Java Card Ready for Hash-Based Signatures? |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Gaurav Sharma 0006, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch |
Secure Certificateless Proxy Re-encryption Without Pairing. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002, Kai He |
Multipurpose Public-Key Encryption. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Fuyang Fang, Bao Li 0001, Xin Wang |
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Obana, Koji Chida (eds.) |
Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rui Xu 0006, Kirill Morozov, Anirban Basu 0001, Mohammad Shahriar Rahman, Shinsaku Kiyomoto |
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Bao Li 0001, Xianhui Lu |
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang 0002 |
The Beauty and the Beasts - The Hard Cases in LLL Reduction. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nasser Mohammed Al-Fannah, Wanpeng Li |
Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai |
Evasion Attacks Against Statistical Code Obfuscation Detectors. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord |
Simple Infeasibility Certificates for Attack Trees. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka |
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata |
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Baptiste Vinh Mau, Koji Nuida |
Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper). |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bingqing Xia, Dongyao Ji, Gang Yao |
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper). |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Akinori Hosoyamada, Kazumaro Aoki |
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. |
IWSEC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenbin Zhang 0003, Chik How Tan |
On the Security and Key Generation of the ZHFE Encryption Scheme. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zejun Xiang 0001, Wentao Zhang, Dongdai Lin |
On the Division Property of Simon48 and Simon64. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka |
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zimin Lin, Rui Wang 0032, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu |
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Denis Butin, Denise Demirel, Johannes Buchmann 0001 |
Formal Policy-Based Provenance Audit. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama |
UC-Secure Dynamic Searchable Symmetric Encryption Scheme. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama |
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Kimmo Halunen, Bart Mennink |
Recipient Privacy in Online Social Networks. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Yamamoto |
Secure Automata-Based Substring Search Scheme on Encrypted Data. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao |
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama |
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xie 0007, Yong Tang, Shuhui Chen, Yi Zhang, Yuanming Gao |
Security of Web of Things: A Survey. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar |
Hybrid Risk Assessment Model Based on Bayesian Networks. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Gerardo Pelosi |
A Note on Fault Attacks Against Deterministic Signature Schemes. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Hoon Jeong, Hyung Chan Kim, Il Hwan Park, Bong-Nam Noh |
Hooking Graceful Moments: A Security Analysis of Sudo Session Handling. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tao Zhang 0014, Sherman S. M. Chow, Zhe Zhou 0001, Ming Li 0006 |
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai 0001, Tatsuji Munaka |
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Momonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda |
Practical Analysis of Key Recovery Attack Against Search-LWE Problem. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qianqian Yang 0003, Lei Hu, Siwei Sun, Ling Song 0001 |
Related-Key Impossible Differential Analysis of Full Khudra. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kazuto Ogawa, Katsunari Yoshioka (eds.) |
Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Liqiang Peng, Lei Hu, Yao Lu 0002, Zhangjie Huang, Jun Xu 0022 |
Implicit Factorization of RSA Moduli Revisited (Short Paper). |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yu, Kwang Ho Kim, Myong Song Jo |
New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani |
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jingnan He, Bao Li 0001, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun |
Identity-Based Lossy Encryption from Learning with Errors. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shunsuke Taketani, Wakaha Ogata |
Improvement of UC Secure Searchable Symmetric Encryption Scheme. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fuyang Fang, Bao Li 0001, Xianhui Lu, Xiaochao Sun |
Improved Efficiency of MP12. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue |
An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi |
k-Anonymous Microdata Release via Post Randomisation Method. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo, Keita Emura |
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shahidatul Sadiah, Toru Nakanishi 0001, Nobuo Funabiki |
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka |
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fuqun Wang, Kunpeng Wang, Bao Li 0001 |
LWE-Based FHE with Better Parameters. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Reina Yagasaki, Kazuo Sakiyama |
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song 0001 |
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Keisuke Tanaka, Yuji Suga (eds.) |
Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing |
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto |
Secure Multi-Party Computation Using Polarizing Cards. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Taechan Kim 0001, Mehdi Tibouchi |
Invalid Curve Attacks in a GLS Setting. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hidetaka Hoshino, Satoshi Obana |
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tingting Zhang, Hongda Li 0001 |
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tong Liu, Yazhe Wang |
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Avijit Dutta, Goutam Paul 0001 |
Deterministic Hard Fault Attack on Trivium. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Mridul Nandi |
Characterization of EME with Linear Mixing. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aslí Bay, Jialin Huang, Serge Vaudenay |
Improved Linear Cryptanalysis of Reduced-Round MIBS. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hailong Zhang 0001 |
How to Effectively Decrease the Resource Requirement in Template Attack? |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama |
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng |
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jan Hajny, Lukas Malina, Ondrej Tethal |
Privacy-Friendly Access Control Based on Personal Attributes. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kosei Endo, Noboru Kunihiro |
On the Security Proof of an Authentication Protocol from Eurocrypt 2011. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Obana, Kazuya Tsuchida |
Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marina Krotofil, Jason Larsen |
Are You Threatening My Hazards? |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maki Yoshida, Koichi Mouri (eds.) |
Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui Xu 0006, Kirill Morozov, Tsuyoshi Takagi |
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammet Ali Evci, Selçuk Kavut |
DPA Resilience of Rotation-Symmetric S-boxes. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Sato, Toshihiro Yamauchi |
Complicating Process Identification by Replacing Process Information for Attack Avoidance. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Palmieri 0001, Johan A. Pouwelse |
Key Management for Onion Routing in a True Peer to Peer Setting. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Satsuya Ohata, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura |
More Constructions of Re-splittable Threshold Public Key Encryption. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Kazuki Yoneyama |
Secure Multi-Party Computation for Elliptic Curves. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dingding Jia, Bao Li 0001, Xianhui Lu, Qixiang Mei |
Related Key Secure PKE from Hash Proof Systems. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Akagi, Yasuyuki Nogami |
Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin |
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Sayantan Mukherjee |
Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii |
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering. |
IWSEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shotaro Sano, Takuma Otsuka, Hiroshi G. Okuno |
Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yutaro Kiyomura, Tsuyoshi Takagi |
Efficient Algorithm for Tate Pairing of Composite Order. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
One-Round Authenticated Key Exchange without Implementation Trick. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo |
Toward Practical Searchable Symmetric Encryption. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo, Yu Sasaki |
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yi Deng 0002, Yang Zhang 0021, Liang Cheng 0004, Xiaoshan Sun |
Static Integer Overflow Vulnerability Detection in Windows Binary. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Haruna Higo, Keisuke Tanaka, Kenji Yasunaga |
Game-Theoretic Security for Bit Commitment. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yasufumi Hashimoto |
Cryptanalysis of the Quaternion Rainbow. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Paul Lin |
Statistics on Encrypted Cloud Data. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | José Moreira, Marcel Fernandez, Grigory Kabatiansky |
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Sakiyama, Masayuki Terada (eds.) |
Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mostafa M. I. Taha, Patrick Schaumont |
Differential Power Analysis of MAC-Keccak at Any Key-Length. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda |
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Palmieri 0001, Olivier Pereira |
Unconditionally Secure Oblivious Transfer from Real Network Behavior. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yun-Ju Huang, Christophe Petit 0001, Naoyuki Shinohara, Tsuyoshi Takagi |
Improvement of Faugère et al.'s Method to Solve ECDLP. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|