default search action
7. IWSEC 2012: Fukuoka, Japan
- Goichiro Hanaoka, Toshihiro Yamauchi:
Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Lecture Notes in Computer Science 7631, Springer 2012, ISBN 978-3-642-34116-8
Implementation
- Yiming Jing, Gail-Joon Ahn, Hongxin Hu:
Model-Based Conformance Testing for Android. 1-18 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. 19-36 - Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang:
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU. 37-50 - Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe:
Very Short Critical Path Implementation of AES with Direct Logic Gates. 51-68
Encryption and Key Exchange
- Kazuki Yoneyama:
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary. 69-86 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact Stateful Encryption Schemes with Ciphertext Verifiability. 87-104 - Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba:
Structured Encryption for Conceptual Graphs. 105-122 - Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka:
Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability. 123-137
Cryptanalysis
- Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. 138-155 - Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:
Boomerang Distinguishers for Full HAS-160 Compression Function. 156-169 - Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. 170-181 - Jingjing Wang, Kefei Chen, Shixiong Zhu:
Annihilators of Fast Discrete Fourier Spectra Attacks. 182-196 - Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque:
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. 197-215
Secure Protocols
- Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. 216-232 - Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang:
Efficient Secure Primitive for Privacy Preserving Distributed Computations. 233-243 - Itsuki Suzuki, Maki Yoshida, Toru Fujiwara:
Generic Construction of GUC Secure Commitment in the KRK Model. 244-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.