


default search action
16th IWSEC 2021: Virtual Event
- Toru Nakanishi, Ryo Nojima:

Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings. Lecture Notes in Computer Science 12835, Springer 2021, ISBN 978-3-030-85986-2
Lattice-Based Cryptography
- Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda:

A Trace Map Attack Against Special Ring-LWE Samples. 3-22 - Shusaku Uemura, Kazuhide Fukushima

, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. 23-41
System Security
- Hiroki Kuzuno

, Toshihiro Yamauchi
:
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. 45-63 - Toru Nakamura

, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi
:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. 64-73
Multiparty Computation
- Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura

:
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. 77-96
Machine Learning and Security
- Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:

Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. 99-118 - Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:

Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. 119-133
Post-Quantum Cryptography (1)
- Yasufumi Hashimoto

:
Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices. 137-150 - Masahiro Masuda, Yukiyoshi Kameyama:

FFT Program Generation for Ring LWE-Based Cryptography. 151-171
Symmetric-Key Cryptography
- Takanori Daiza, Kaoru Kurosawa:

Optimum Attack on 3-Round Feistel-2 Structure. 175-192
Post-Quantum Cryptography (2)
- Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:

An Intermediate Secret-Guessing Attack on Hash-Based Signatures. 195-215 - Jason T. LeGrow

, Aaron Hutchinson:
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH. 216-226 - Changze Yin, Yacheng Wang, Tsuyoshi Takagi:

(Short Paper) Simple Matrix Signature Scheme. 227-237
Game Theory and Security
- Koji Hamasaki

, Hitoshi Hohjo
:
Moving Target Defense for the CloudControl Game. 241-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














