default search action
17th IWSEC 2022: Tokyo, Japan
- Chen-Mou Cheng, Mitsuaki Akiyama:
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings. Lecture Notes in Computer Science 13504, Springer 2022, ISBN 978-3-031-15254-2
Mathematical Cryptography
- Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang:
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms. 3-23 - Edoardo Persichetti, Tovohery Randrianarisoa:
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography. 24-44
System Security and Threat Intelligence
- Sihao Shen, Zhenzhen Li, Wei Song:
Methods of Extracting Parameters of the Processor Caches. 47-65 - Hiroki Kuzuno, Toshihiro Yamauchi:
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. 66-84 - Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi:
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. 85-104
Symmetric-Key Cryptography
- Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. 107-127 - Takanori Daiza, Kazuki Yoneyama:
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles. 128-144
Post-quantum Cryptography
- Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi:
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. 147-165 - Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. 166-186
Advanced Cryptography
- Hirotomo Shinoki, Koji Nuida:
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. 189-207 - Nariyasu Heseri, Koji Nuida:
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols. 208-223 - Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, Takaaki Mizuki:
Card-Based Secure Sorting Protocol. 224-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.