default search action
13th IWSEC 2018: Sendai, Japan
- Atsuo Inomata, Kan Yasuda:
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings. Lecture Notes in Computer Science 11049, Springer 2018, ISBN 978-3-319-97915-1
Cryptanalysis
- Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. 3-18 - Terry Shue Chien Lau, Chik How Tan:
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation. 19-34 - Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma:
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. 35-47
Implementation Security
- Andreas Wiemers, Dominik Klein:
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. 51-67 - Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki:
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. 68-83
Public-Key Primitives
- Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi:
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. 87-103 - Akinaga Ueda, Hayato Tada, Kaoru Kurosawa:
(Short Paper) How to Solve DLOG Problem with Auxiliary Input. 104-113 - Kazumaro Aoki:
(Short Paper) Parameter Trade-Offs for NFS and ECM. 114-123
Security in Practice
- Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card Ready for Hash-Based Signatures? 127-142 - Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Detecting Privacy Information Abuse by Android Apps from API Call Logs. 143-157 - Cheng Shi, Kazuki Yoneyama:
Verification of LINE Encryption Version 1.0 Using ProVerif. 158-173 - Makoto Iguchi, Taro Uematsu, Tatsuro Fujii:
The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing. 174-189
Secret Sharing
- Louis Cianciullo, Hossein Ghodosi:
Improvements to Almost Optimum Secret Sharing with Cheating Detection. 193-205 - Koji Shima, Hiroshi Doi:
XOR-Based Hierarchical Secret Sharing Scheme. 206-223
Symmetric-Key Primitives
- Yu Sasaki:
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. 227-243 - Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang:
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. 244-261 - Qiuping Li, Baofeng Wu, Zhuojun Liu:
Lightweight Recursive MDS Matrices with Generalized Feistel Network. 262-278
Provable Security
- Hayato Tada, Akinaga Ueda, Kaoru Kurosawa:
How to Prove KDM Security of BHHO. 281-296 - Pauline Bert, Adeline Roux-Langlois:
From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature. 297-312 - Chen Qian, Mehdi Tibouchi, Rémi Géraud:
Universal Witness Signatures. 313-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.