


default search action
17th IWSEC 2022: Tokyo, Japan
- Chen-Mou Cheng, Mitsuaki Akiyama
:
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings. Lecture Notes in Computer Science 13504, Springer 2022, ISBN 978-3-031-15254-2
Mathematical Cryptography
- Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang:
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms. 3-23 - Edoardo Persichetti
, Tovohery Randrianarisoa
:
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography. 24-44
System Security and Threat Intelligence
- Sihao Shen, Zhenzhen Li, Wei Song
:
Methods of Extracting Parameters of the Processor Caches. 47-65 - Hiroki Kuzuno
, Toshihiro Yamauchi
:
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. 66-84 - Shota Fujii
, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi
:
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. 85-104
Symmetric-Key Cryptography
- Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. 107-127 - Takanori Daiza, Kazuki Yoneyama:
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles. 128-144
Post-quantum Cryptography
- Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi:
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. 147-165 - Jing-Shiuan You, Zi-Yuan Liu
, Raylin Tso
, Yi-Fan Tseng
, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. 166-186
Advanced Cryptography
- Hirotomo Shinoki, Koji Nuida
:
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. 189-207 - Nariyasu Heseri, Koji Nuida
:
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols. 208-223 - Rikuo Haga
, Kodai Toyoda
, Yuto Shinoda
, Daiki Miyahara
, Kazumasa Shinagawa
, Yuichi Hayashi
, Takaaki Mizuki
:
Card-Based Secure Sorting Protocol. 224-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.