default search action
12th IWSEC 2017: Hiroshima, Japan
- Satoshi Obana, Koji Chida:
Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10418, Springer 2017, ISBN 978-3-319-64199-7
Post-quantum Cryptography
- Akinori Hosoyamada, Kazumaro Aoki:
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. 3-18 - Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. 19-35
System Security (1)
- Ahto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord:
Simple Infeasibility Certificates for Attack Trees. 39-55 - Bingqing Xia, Dongyao Ji, Gang Yao:
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper). 56-66
Public Key Cryptosystems (1)
- Rui Zhang, Kai He:
Multipurpose Public-Key Encryption. 69-84 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch:
Secure Certificateless Proxy Re-encryption Without Pairing. 85-101
System Security (2)
- Nasser Mohammed Al-Fannah, Wanpeng Li:
Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability. 105-120 - Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. 121-137
Cryptanalysis
- Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. 141-158 - Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. 159-178
Cryptographic Protocols
- Baptiste Vinh Mau, Koji Nuida:
Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper). 181-191 - Atsushi Fujioka:
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. 192-211
Public Key Cryptosystems (2)
- Daode Zhang, Fuyang Fang, Bao Li, Xin Wang:
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters. 215-230 - Haiyang Xue, Bao Li, Xianhui Lu:
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). 231-241
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.