


default search action
13th IWSEC 2018: Sendai, Japan
- Atsuo Inomata, Kan Yasuda:

Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings. Lecture Notes in Computer Science 11049, Springer 2018, ISBN 978-3-319-97915-1
Cryptanalysis
- Yasufumi Hashimoto

, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. 3-18 - Terry Shue Chien Lau

, Chik How Tan:
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation. 19-34 - Sota Onozawa, Noboru Kunihiro

, Masayuki Yoshino, Ken Naganuma:
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. 35-47
Implementation Security
- Andreas Wiemers, Dominik Klein:

Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. 51-67 - Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki:

Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. 68-83
Public-Key Primitives
- Weiyao Wang, Yuntao Wang

, Atsushi Takayasu, Tsuyoshi Takagi:
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. 87-103 - Akinaga Ueda, Hayato Tada, Kaoru Kurosawa:

(Short Paper) How to Solve DLOG Problem with Auxiliary Input. 104-113 - Kazumaro Aoki:

(Short Paper) Parameter Trade-Offs for NFS and ECM. 114-123
Security in Practice
- Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter

, Peter Schwabe, Jan Verschuren:
Is Java Card Ready for Hash-Based Signatures? 127-142 - Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:

Detecting Privacy Information Abuse by Android Apps from API Call Logs. 143-157 - Cheng Shi, Kazuki Yoneyama:

Verification of LINE Encryption Version 1.0 Using ProVerif. 158-173 - Makoto Iguchi

, Taro Uematsu, Tatsuro Fujii:
The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing. 174-189
Secret Sharing
- Louis Cianciullo, Hossein Ghodosi:

Improvements to Almost Optimum Secret Sharing with Cheating Detection. 193-205 - Koji Shima, Hiroshi Doi:

XOR-Based Hierarchical Secret Sharing Scheme. 206-223
Symmetric-Key Primitives
- Yu Sasaki:

Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. 227-243 - Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang:

Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. 244-261 - Qiuping Li, Baofeng Wu

, Zhuojun Liu:
Lightweight Recursive MDS Matrices with Generalized Feistel Network. 262-278
Provable Security
- Hayato Tada, Akinaga Ueda, Kaoru Kurosawa:

How to Prove KDM Security of BHHO. 281-296 - Pauline Bert, Adeline Roux-Langlois

:
From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature. 297-312 - Chen Qian

, Mehdi Tibouchi, Rémi Géraud
:
Universal Witness Signatures. 313-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














