default search action
16th IWSEC 2021: Virtual Event
- Toru Nakanishi, Ryo Nojima:
Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings. Lecture Notes in Computer Science 12835, Springer 2021, ISBN 978-3-030-85986-2
Lattice-Based Cryptography
- Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda:
A Trace Map Attack Against Special Ring-LWE Samples. 3-22 - Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. 23-41
System Security
- Hiroki Kuzuno, Toshihiro Yamauchi:
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. 45-63 - Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. 64-73
Multiparty Computation
- Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. 77-96
Machine Learning and Security
- Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. 99-118 - Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. 119-133
Post-Quantum Cryptography (1)
- Yasufumi Hashimoto:
Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices. 137-150 - Masahiro Masuda, Yukiyoshi Kameyama:
FFT Program Generation for Ring LWE-Based Cryptography. 151-171
Symmetric-Key Cryptography
- Takanori Daiza, Kaoru Kurosawa:
Optimum Attack on 3-Round Feistel-2 Structure. 175-192
Post-Quantum Cryptography (2)
- Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. 195-215 - Jason T. LeGrow, Aaron Hutchinson:
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH. 216-226 - Changze Yin, Yacheng Wang, Tsuyoshi Takagi:
(Short Paper) Simple Matrix Signature Scheme. 227-237
Game Theory and Security
- Koji Hamasaki, Hitoshi Hohjo:
Moving Target Defense for the CloudControl Game. 241-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.