Search dblp for Publications

export results for "stream:conf/iwsec:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/AlavizadehJAA24,
  author       = {Hooman Alavizadeh and
                  Julian Jang{-}Jaccard and
                  Hootan Alavizadeh and
                  Tansu Alpcan},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {244--254},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_14},
  doi          = {10.1007/978-981-97-7737-2\_14},
  timestamp    = {Sun, 29 Sep 2024 21:17:19 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlavizadehJAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BelelD24,
  author       = {Anushree Belel and
                  Ratna Dutta},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Attribute-Based Inner Product Functional Encryption in Key-Policy
                  Setting from Pairing},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {101--121},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_6},
  doi          = {10.1007/978-981-97-7737-2\_6},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BelelD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BilleT24,
  author       = {Alexander Bille and
                  Elmar Tischhauser},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time
                  Systems},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_2},
  doi          = {10.1007/978-981-97-7737-2\_2},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BilleT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BilotMAZ24,
  author       = {Tristan Bilot and
                  Nour El Madhoun and
                  Khaldoun Al Agha and
                  Anis Zouaoui},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Few Edges are Enough: Few-Shot Network Attack Detection with Graph
                  Neural Networks},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_15},
  doi          = {10.1007/978-981-97-7737-2\_15},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BilotMAZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FairozeD24,
  author       = {Jaiden Fairoze and
                  Peitong Duan},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Information Leakage Through Packet Lengths in {RTC} Traffic},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_16},
  doi          = {10.1007/978-981-97-7737-2\_16},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FairozeD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HondaS24,
  author       = {Yoshiaki Honda and
                  Kazumasa Shinagawa},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Efficient Card-Based Protocols with a Standard Deck of Playing Cards
                  Using Partial Opening},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_5},
  doi          = {10.1007/978-981-97-7737-2\_5},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HondaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Hwang24,
  author       = {Vincent Hwang},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Formal Verification of Emulated Floating-Point Arithmetic in Falcon},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {125--141},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_7},
  doi          = {10.1007/978-981-97-7737-2\_7},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Hwang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/List24,
  author       = {Eik List},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Higher-Order Mixture Differentials for AES-Based Block Ciphers and
                  Applications to TweAES},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_3},
  doi          = {10.1007/978-981-97-7737-2\_3},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/List24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MahboubiCAPMDP24,
  author       = {Arash Mahboubi and
                  Seyit Camtepe and
                  Keyvan Ansari and
                  Marcin Piotr Pawlowski and
                  Pawel Morawiecki and
                  Jaroslaw Duda and
                  Josef Pieprzyk},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {File System Shield {(FSS):} {A} Pass-Through Strategy Against Unwanted
                  Encryption in Network File Systems},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {213--233},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_12},
  doi          = {10.1007/978-981-97-7737-2\_12},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MahboubiCAPMDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MiyachiNS24,
  author       = {Rin Miyachi and
                  Konan Nagashima and
                  Taiichi Saito},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Race Condition Vulnerabilities in WordPress Plug-ins},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_10},
  doi          = {10.1007/978-981-97-7737-2\_10},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MiyachiNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OkajimaC24,
  author       = {Kabuto Okajima and
                  Koji Chida},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {A Study on Anonymization Through Participation in iPWS Cup 2023},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {297--306},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_17},
  doi          = {10.1007/978-981-97-7737-2\_17},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OkajimaC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoAKY24,
  author       = {Arata Sato and
                  Aur{\'{e}}lien Auzemery and
                  Akira Katayama and
                  Masaya Yasuda},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Experimental Analysis of Integer Factorization Methods Using Lattices},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_8},
  doi          = {10.1007/978-981-97-7737-2\_8},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoAKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShirayaSI24,
  author       = {Takuro Shiraya and
                  Kosei Sakamoto and
                  Takanori Isobe},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Bit-Wise Analysis for Forgery Attacks on AES-Based {AEAD} Schemes},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_1},
  doi          = {10.1007/978-981-97-7737-2\_1},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShirayaSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/StabiliBVM24,
  author       = {Dario Stabili and
                  Tobia Bocchi and
                  Filip Valgimigli and
                  Mirco Marchetti},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Finding (and Exploiting) Vulnerabilities on {IP} Cameras: The Tenda
                  {CP3} Case Study},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_11},
  doi          = {10.1007/978-981-97-7737-2\_11},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/StabiliBVM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SugioI24,
  author       = {Nobuyuki Sugio and
                  Hokuto Ito},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Implementation for Malicious Software Using ChatGPT-4},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {234--243},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_13},
  doi          = {10.1007/978-981-97-7737-2\_13},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SugioI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TagaIO24,
  author       = {Bungo Taga and
                  Norimitsu Ito and
                  Takako Okano},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Weak Keys of the Full {MISTY1} Recovered in Practical Time},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_4},
  doi          = {10.1007/978-981-97-7737-2\_4},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TagaIO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoshiguchiAT24,
  author       = {Naoki Yoshiguchi and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Sieving Method for {SDP} with the Zero Window: An Improvement in Low
                  Memory Environments},
  booktitle    = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2\_9},
  doi          = {10.1007/978-981-97-7737-2\_9},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoshiguchiAT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2024,
  editor       = {Kazuhiko Minematsu and
                  Mamoru Mimura},
  title        = {Advances in Information and Computer Security - 19th International
                  Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14977},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-7737-2},
  doi          = {10.1007/978-981-97-7737-2},
  isbn         = {978-981-97-7736-5},
  timestamp    = {Sun, 29 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AmbronaBST23,
  author       = {Miguel Ambrona and
                  Marc Beunardeau and
                  Anne{-}Laure Schmitt and
                  Raphael R. Toledo},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {a\emph{P}lon\emph{K}: Aggregated \emph{P}lon\emph{K} from Multi-polynomial
                  Commitment Schemes},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {195--213},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_11},
  doi          = {10.1007/978-3-031-41326-1\_11},
  timestamp    = {Fri, 25 Aug 2023 19:50:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AmbronaBST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Ville Yli{-}M{\"{a}}yry},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Reliability of Ring Oscillator PUFs with Reduced Helper Data},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {36--56},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_3},
  doi          = {10.1007/978-3-031-41326-1\_3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/CartorCLS23,
  author       = {Max Cartor and
                  Ryann Cartor and
                  Mark Lewis and
                  Daniel Smith{-}Tone},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Total Break of a Public Key Cryptosystem Based on a Group of Permutation
                  Polynomials},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_8},
  doi          = {10.1007/978-3-031-41326-1\_8},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CartorCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FurueI23,
  author       = {Hiroki Furue and
                  Yasuhiko Ikematsu},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {A New Security Analysis Against {MAYO} and {QR-UOV} Using Rectangular
                  MinRank Attack},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_6},
  doi          = {10.1007/978-3-031-41326-1\_6},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FurueI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FuruyaKIMI23,
  author       = {Isamu Furuya and
                  Hayato Kasahara and
                  Akiko Inoue and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {PMACrx: {A} Vector-Input {MAC} for High-Dimensional Vectors with {BBB}
                  Security},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {77--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_5},
  doi          = {10.1007/978-3-031-41326-1\_5},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FuruyaKIMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/GiraudN23,
  author       = {Vincent Giraud and
                  David Naccache},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Power Analysis Pushed too Far: Breaking Android-Based Isolation with
                  Fuel Gauges},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_1},
  doi          = {10.1007/978-3-031-41326-1\_1},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/GiraudN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HandKLMR23,
  author       = {Samuel D. Hand and
                  Alexander Koch and
                  Pascal Lafourcade and
                  Daiki Miyahara and
                  L{\'{e}}o Robert},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Check Alternating Patterns: {A} Physical Zero-Knowledge Proof for
                  Moon-or-Sun},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_14},
  doi          = {10.1007/978-3-031-41326-1\_14},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HandKLMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LeeS23,
  author       = {Hyeonbum Lee and
                  Jae Hong Seo},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {{TENET:} Sublogarithmic Proof and Sublinear Verifier Inner Product
                  Argument without a Trusted Setup},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_12},
  doi          = {10.1007/978-3-031-41326-1\_12},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LeeS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MarcoTV23,
  author       = {Laurane Marco and
                  Abdullah Talayhan and
                  Serge Vaudenay},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Making Classical (Threshold) Signatures Post-quantum for Single Use
                  on a Public Ledger},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {173--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_10},
  doi          = {10.1007/978-3-031-41326-1\_10},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MarcoTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Nuida23,
  author       = {Koji Nuida},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Efficient Card-Based Millionaires' Protocols via Non-binary Input
                  Encoding},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_13},
  doi          = {10.1007/978-3-031-41326-1\_13},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Nuida23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/RemigioBPCZ23,
  author       = {Riccardo Remigio and
                  Alessandro Bertani and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {The Good, the Bad, and the Binary: An LSTM-Based Method for Section
                  Boundary Detection in Firmware Analysis},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_2},
  doi          = {10.1007/978-3-031-41326-1\_2},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/RemigioBPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TranV23,
  author       = {B{\'{e}}n{\'{e}}dikt Tran and
                  Serge Vaudenay},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Extractable Witness Encryption for the Homogeneous Linear Equations
                  Problem},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {152--172},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_9},
  doi          = {10.1007/978-3-031-41326-1\_9},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TranV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhaoZYSH23,
  author       = {Jiahao Zhao and
                  Nana Zhang and
                  Qianqian Yang and
                  Ling Song and
                  Lei Hu},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Improved Boomerang Attacks on Deoxys-BC},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_4},
  doi          = {10.1007/978-3-031-41326-1\_4},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhaoZYSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhuKKT23,
  author       = {Haiming Zhu and
                  Shoichi Kamada and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Improved Hybrid Attack via Error-Splitting Method for Finding Quinary
                  Short Lattice Vectors},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {117--136},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_7},
  doi          = {10.1007/978-3-031-41326-1\_7},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhuKKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2023,
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1},
  doi          = {10.1007/978-3-031-41326-1},
  isbn         = {978-3-031-41325-4},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeckerHKPY22,
  author       = {Hanno Becker and
                  Vincent Hwang and
                  Matthias J. Kannwischer and
                  Lorenz Panny and
                  Bo{-}Yin Yang},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic
                  Transforms},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_1},
  doi          = {10.1007/978-3-031-15255-9\_1},
  timestamp    = {Thu, 18 Aug 2022 14:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeckerHKPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DaizaY22,
  author       = {Takanori Daiza and
                  Kazuki Yoneyama},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without
                  Quantum Encryption Oracles},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_7},
  doi          = {10.1007/978-3-031-15255-9\_7},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DaizaY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FujiiKSY22,
  author       = {Shota Fujii and
                  Nobutaka Kawaguchi and
                  Tomohiro Shigemoto and
                  Toshihiro Yamauchi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {CyNER: Information Extraction from Unstructured Text of {CTI} Sources
                  with Noncontextual IOCs},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {85--104},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_5},
  doi          = {10.1007/978-3-031-15255-9\_5},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FujiiKSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HagaTSMSHM22,
  author       = {Rikuo Haga and
                  Kodai Toyoda and
                  Yuto Shinoda and
                  Daiki Miyahara and
                  Kazumasa Shinagawa and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Card-Based Secure Sorting Protocol},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_12},
  doi          = {10.1007/978-3-031-15255-9\_12},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HagaTSMSHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HeseriN22,
  author       = {Nariyasu Heseri and
                  Koji Nuida},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real
                  Randomness in {MPC} Protocols},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_11},
  doi          = {10.1007/978-3-031-15255-9\_11},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HeseriN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KatoKT22,
  author       = {Taku Kato and
                  Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {147--165},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_8},
  doi          = {10.1007/978-3-031-15255-9\_8},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KatoKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY22,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {{KDPM:} Kernel Data Protection Mechanism Using a Memory Protection
                  Key},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {66--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_4},
  doi          = {10.1007/978-3-031-15255-9\_4},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PersichettiR22,
  author       = {Edoardo Persichetti and
                  Tovohery Randrianarisoa},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {On Linear Complexity of Finite Sequences: Coding Theory and Applications
                  to Cryptography},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_2},
  doi          = {10.1007/978-3-031-15255-9\_2},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PersichettiR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShenLS22,
  author       = {Sihao Shen and
                  Zhenzhen Li and
                  Wei Song},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Methods of Extracting Parameters of the Processor Caches},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {47--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_3},
  doi          = {10.1007/978-3-031-15255-9\_3},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShenLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinokiN22,
  author       = {Hirotomo Shinoki and
                  Koji Nuida},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {189--207},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_10},
  doi          = {10.1007/978-3-031-15255-9\_10},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinokiN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SibleyrasSTHY22,
  author       = {Ferdinand Sibleyras and
                  Yu Sasaki and
                  Yosuke Todo and
                  Akinori Hosoyamada and
                  Kan Yasuda},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for
                  All Key Sizes},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {107--127},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_6},
  doi          = {10.1007/978-3-031-15255-9\_6},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SibleyrasSTHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YouLTTM22,
  author       = {Jing{-}Shiuan You and
                  Zi{-}Yuan Liu and
                  Raylin Tso and
                  Yi{-}Fan Tseng and
                  Masahiro Mambo},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {166--186},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_9},
  doi          = {10.1007/978-3-031-15255-9\_9},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YouLTTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2022,
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9},
  doi          = {10.1007/978-3-031-15255-9},
  isbn         = {978-3-031-15254-2},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BoothXKS21,
  author       = {Roland Booth and
                  Yanhong Xu and
                  Sabyasachi Karati and
                  Reihaneh Safavi{-}Naini},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {An Intermediate Secret-Guessing Attack on Hash-Based Signatures},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {195--215},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_11},
  doi          = {10.1007/978-3-030-85987-9\_11},
  timestamp    = {Fri, 03 Sep 2021 14:25:23 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BoothXKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DaizaK21,
  author       = {Takanori Daiza and
                  Kaoru Kurosawa},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Optimum Attack on 3-Round Feistel-2 Structure},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_10},
  doi          = {10.1007/978-3-030-85987-9\_10},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DaizaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FanSOCAM21,
  author       = {Yun Fan and
                  Toshiki Shibahara and
                  Yuichi Ohsita and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Masayuki Murata},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Understanding Update of Machine-Learning-Based Malware Detection by
                  Clustering Changes in Feature Attributions},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {99--118},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_6},
  doi          = {10.1007/978-3-030-85987-9\_6},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/FanSOCAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HamasakiH21,
  author       = {Koji Hamasaki and
                  Hitoshi Hohjo},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Moving Target Defense for the CloudControl Game},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_14},
  doi          = {10.1007/978-3-030-85987-9\_14},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HamasakiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Hashimoto21,
  author       = {Yasufumi Hashimoto},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant
                  Matrices},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_8},
  doi          = {10.1007/978-3-030-85987-9\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Hashimoto21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IkematsuNY21,
  author       = {Yasuhiko Ikematsu and
                  Satoshi Nakamura and
                  Masaya Yasuda},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {A Trace Map Attack Against Special Ring-LWE Samples},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_1},
  doi          = {10.1007/978-3-030-85987-9\_1},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/IkematsuNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY21,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {{KPRM:} Kernel Page Restriction Mechanism to Prevent Kernel Memory
                  Corruption},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {45--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_3},
  doi          = {10.1007/978-3-030-85987-9\_3},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LeGrowH21,
  author       = {Jason T. LeGrow and
                  Aaron Hutchinson},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral
                  {CSIDH}},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {216--226},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_12},
  doi          = {10.1007/978-3-030-85987-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LeGrowH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MasudaK21,
  author       = {Masahiro Masuda and
                  Yukiyoshi Kameyama},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {{FFT} Program Generation for Ring LWE-Based Cryptography},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_9},
  doi          = {10.1007/978-3-030-85987-9\_9},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MasudaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21,
  author       = {Toru Nakamura and
                  Hiroshi Ito and
                  Shinsaku Kiyomoto and
                  Toshihiro Yamauchi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Evidence Collection and Preservation System with Virtual
                  Machine Monitoring},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_4},
  doi          = {10.1007/978-3-030-85987-9\_4},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PhalakarnSAM21,
  author       = {Kittiphop Phalakarn and
                  Vorapong Suppakitpaisarn and
                  Nuttapong Attrapadung and
                  Kanta Matsuura},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Evolving Homomorphic Secret Sharing for Hierarchical Access Structures},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {77--96},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_5},
  doi          = {10.1007/978-3-030-85987-9\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PhalakarnSAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on
                  the {LWR} Problem},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_2},
  doi          = {10.1007/978-3-030-85987-9\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YamabaSUAMPO21,
  author       = {Hisaaki Yamaba and
                  Ahmad Saiful Aqmal Bin Ahmad Sohaimi and
                  Shotaro Usuzaki and
                  Kentaro Aburada and
                  Masayuki Mukunoki and
                  Mirang Park and
                  Naonobu Okazaki},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Proposal of Jawi {CAPTCHA} Using Digraphia Feature of the Malay Language},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_7},
  doi          = {10.1007/978-3-030-85987-9\_7},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YamabaSUAMPO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YinWT21,
  author       = {Changze Yin and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Simple Matrix Signature Scheme},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {227--237},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_13},
  doi          = {10.1007/978-3-030-85987-9\_13},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YinWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2021,
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9},
  doi          = {10.1007/978-3-030-85987-9},
  isbn         = {978-3-030-85986-2},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BaninD20,
  author       = {Sergii Banin and
                  Geir Olav Dyrkolbotn},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Detection of Running Malware Before it Becomes Malicious},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_4},
  doi          = {10.1007/978-3-030-58208-1\_4},
  timestamp    = {Thu, 27 Aug 2020 12:11:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BaninD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DanST20,
  author       = {Yuichiro Dan and
                  Toshiki Shibahara and
                  Junko Takahashi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Timing Attack on Random Forests for Generating Adversarial Examples},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_16},
  doi          = {10.1007/978-3-030-58208-1\_16},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DanST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FehrV20,
  author       = {Serge Fehr and
                  Serge Vaudenay},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Sublinear Bounds on the Distinguishing Advantage for Multiple Samples},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {165--183},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_10},
  doi          = {10.1007/978-3-030-58208-1\_10},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FehrV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FukuokaYT20,
  author       = {Takeru Fukuoka and
                  Yuji Yamaoka and
                  Takeaki Terada},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Model Extraction Oriented Data Publishing with k-anonymity},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {218--236},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_13},
  doi          = {10.1007/978-3-030-58208-1\_13},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FukuokaYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KinoshitaS20,
  author       = {Kai Kinoshita and
                  Koutarou Suzuki},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Accelerating Beta Weil Pairing with Precomputation and Multi-pairing
                  Techniques},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {261--281},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_15},
  doi          = {10.1007/978-3-030-58208-1\_15},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KinoshitaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KoderaTKNU20,
  author       = {Yuta Kodera and
                  Yuki Taketa and
                  Takuya Kusaka and
                  Yasuyuki Nogami and
                  Satoshi Uehara},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue
                  Symbol},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {23--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_2},
  doi          = {10.1007/978-3-030-58208-1\_2},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KoderaTKNU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Kurek20,
  author       = {Rafael Kurek},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Efficient Forward-Secure Threshold Signatures},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {239--260},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_14},
  doi          = {10.1007/978-3-030-58208-1\_14},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Kurek20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuzunoY20,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {{MKM:} Multiple Kernel Memory for Protecting Page Table Switching
                  Mechanism Against Memory Corruption},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_6},
  doi          = {10.1007/978-3-030-58208-1\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuzunoY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Matsuda20,
  author       = {Yoshitatsu Matsuda},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Optimization of Search Space for Finding Very Short Lattice Vectors},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_9},
  doi          = {10.1007/978-3-030-58208-1\_9},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Matsuda20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiT20,
  author       = {Hiroshi Onuki and
                  Tsuyoshi Takagi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {On Collisions Related to an Ideal Class of Order 3 in {CSIDH}},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_8},
  doi          = {10.1007/978-3-030-58208-1\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SarkarSS20,
  author       = {Sumanta Sarkar and
                  Yu Sasaki and
                  Siang Meng Sim},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {On the Design of Bit Permutation Based Ciphers - The Interplay Among
                  S-Box, Bit Permutation and Key-Addition},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_1},
  doi          = {10.1007/978-3-030-58208-1\_1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SarkarSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiN20,
  author       = {Kota Sasaki and
                  Koji Nuida},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Efficiency and Accuracy Improvements of Secure Floating-Point Addition
                  over Secret Sharing},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_5},
  doi          = {10.1007/978-3-030-58208-1\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SasakiN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SugawaraO020,
  author       = {Takeshi Sugawara and
                  Tatsuya Onuma and
                  Yang Li},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {(Short Paper) Signal Injection Attack on Time-to-Digital Converter
                  and Its Application to Physically Unclonable Function},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {117--127},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_7},
  doi          = {10.1007/978-3-030-58208-1\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SugawaraO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TajiriM20,
  author       = {Yui Tajiri and
                  Mamoru Mimura},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Detection of Malicious PowerShell Using Word-Level Language Models},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_3},
  doi          = {10.1007/978-3-030-58208-1\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TajiriM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WasedaN20,
  author       = {Atsushi Waseda and
                  Ryo Nojima},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {On Limitation of Plausible Deniability},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_12},
  doi          = {10.1007/978-3-030-58208-1\_12},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WasedaN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YanV20,
  author       = {Hailun Yan and
                  Serge Vaudenay},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Symmetric Asynchronous Ratcheted Communication with Associated Data},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {184--204},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_11},
  doi          = {10.1007/978-3-030-58208-1\_11},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YanV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2020,
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1},
  doi          = {10.1007/978-3-030-58208-1},
  isbn         = {978-3-030-58207-4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BanikFI19,
  author       = {Subhadeep Banik and
                  Yuki Funabiki and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {More Results on Shortest Linear Programs},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_7},
  doi          = {10.1007/978-3-030-26834-3\_7},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BanikFI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BaninD19,
  author       = {Sergii Banin and
                  Geir Olav Dyrkolbotn},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Correlating High- and Low-Level Features: - Increased Understanding
                  of Malware Classification},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_9},
  doi          = {10.1007/978-3-030-26834-3\_9},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BaninD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasFLLT19,
  author       = {Ahto Buldas and
                  Denis Firsov and
                  Risto Laanoja and
                  Henri Lakk and
                  Ahto Truu},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {A New Approach to Constructing Digital Signature Schemes - (Short
                  Paper)},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {363--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_21},
  doi          = {10.1007/978-3-030-26834-3\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasFLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DesmedtM19,
  author       = {Yvo Desmedt and
                  Kirill Morozov},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{VSS} Made Simpler},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_19},
  doi          = {10.1007/978-3-030-26834-3\_19},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Dumas0FLOPP19,
  author       = {Jean{-}Guillaume Dumas and
                  Pascal Lafourcade and
                  Julio L{\'{o}}pez Fenner and
                  David Lucas and
                  Jean{-}Baptiste Orfila and
                  Cl{\'{e}}ment Pernet and
                  Maxime Puys},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd
                  Algorithm},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {67--88},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_5},
  doi          = {10.1007/978-3-030-26834-3\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/Dumas0FLOPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DurakV19,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_20},
  doi          = {10.1007/978-3-030-26834-3\_20},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DurakV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HayataK0HM19,
  author       = {Junichiro Hayata and
                  Fuyuki Kitagawa and
                  Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Equivalence Between Non-malleability Against Replayable {CCA} and
                  Other RCCA-Security Notions},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_15},
  doi          = {10.1007/978-3-030-26834-3\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HayataK0HM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HirutaIST19,
  author       = {Shohei Hiruta and
                  Satoshi Ikeda and
                  Shigeyoshi Shima and
                  Hiroki Takakura},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{IDS} Alert Priority Determination Based on Traffic Behavior},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_11},
  doi          = {10.1007/978-3-030-26834-3\_11},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HirutaIST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ItoSU19,
  author       = {Takuma Ito and
                  Naoyuki Shinohara and
                  Shigenori Uchiyama},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {An Efficient F{\_}4 -style Based Algorithm to Solve {MQ} Problems},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_3},
  doi          = {10.1007/978-3-030-26834-3\_3},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ItoSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KoayWS19,
  author       = {Abigail M. Y. Koay and
                  Ian Welch and
                  Winston K. G. Seah},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) Effectiveness of Entropy-Based Features in High- and
                  Low-Intensity DDoS Attacks Detection},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_12},
  doi          = {10.1007/978-3-030-26834-3\_12},
  timestamp    = {Tue, 10 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KoayWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19,
  author       = {Kaoru Kurosawa and
                  Akinaga Ueda and
                  Hayato Matsuhashi and
                  Yusuke Sakagami},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {53--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_4},
  doi          = {10.1007/978-3-030-26834-3\_4},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuCW19,
  author       = {Fukang Liu and
                  Zhenfu Cao and
                  Gaoli Wang},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_17},
  doi          = {10.1007/978-3-030-26834-3\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuI19,
  author       = {Fukang Liu and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {306--326},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_18},
  doi          = {10.1007/978-3-030-26834-3\_18},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MantasP19,
  author       = {Evangelos Mantas and
                  Constantinos Patsakis},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{GRYPHON:} Drone Forensics in Dataflash and Telemetry Logs},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {377--390},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_22},
  doi          = {10.1007/978-3-030-26834-3\_22},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MantasP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MimuraO19,
  author       = {Mamoru Mimura and
                  Taro Ohminami},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Towards Efficient Detection of Malicious {VBA} Macros with {LSI}},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {168--185},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_10},
  doi          = {10.1007/978-3-030-26834-3\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/MimuraO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OkishimaN19,
  author       = {Ryo Okishima and
                  Toru Nakanishi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {An Anonymous Credential System with Constant-Size Attribute Proofs
                  for {CNF} Formulas with Negations},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_6},
  doi          = {10.1007/978-3-030-26834-3\_6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OkishimaN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiAYT19,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsutomu Yamazaki and
                  Tsuyoshi Takagi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping
                  Two Points},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_2},
  doi          = {10.1007/978-3-030-26834-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OtsukiKIMFL19,
  author       = {Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Jun Miyoshi and
                  Jacob Faires and
                  Terrence Lillard},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Toward the Analysis of Distributed Code Injection in Post-mortem Forensics},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {391--409},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_23},
  doi          = {10.1007/978-3-030-26834-3\_23},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OtsukiKIMFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Yuki Funabiki and
                  Andrey Bogdanov and
                  Sumio Morioka and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized
                  Feistel Structure},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_8},
  doi          = {10.1007/978-3-030-26834-3\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoIOY19,
  author       = {Masaya Sato and
                  Yuta Imamura and
                  Rintaro Orito and
                  Toshihiro Yamauchi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) Method for Preventing Suspicious Web Access in Android
                  WebView},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {241--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_14},
  doi          = {10.1007/978-3-030-26834-3\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TomitaOK19,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from
                  Simple (Not {\textbackslash}mathtt q -type) Assumptions},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_1},
  doi          = {10.1007/978-3-030-26834-3\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangLX19,
  author       = {Xin Wang and
                  Shimin Li and
                  Rui Xue},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation
                  Techniques (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {273--283},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_16},
  doi          = {10.1007/978-3-030-26834-3\_16},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZeierWH19,
  author       = {Alexander Zeier and
                  Alexander Wiesmaier and
                  Andreas Heinemann},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{API} Usability of Stateful Signature Schemes},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_13},
  doi          = {10.1007/978-3-030-26834-3\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZeierWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2019,
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3},
  doi          = {10.1007/978-3-030-26834-3},
  isbn         = {978-3-030-26833-6},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0002TG18,
  author       = {Chen Qian and
                  Mehdi Tibouchi and
                  R{\'{e}}mi G{\'{e}}raud},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Universal Witness Signatures},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {313--329},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_20},
  doi          = {10.1007/978-3-319-97916-8\_20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/0002TG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Aoki18,
  author       = {Kazumaro Aoki},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {(Short Paper) Parameter Trade-Offs for {NFS} and {ECM}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {114--123},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_8},
  doi          = {10.1007/978-3-319-97916-8\_8},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Aoki18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BertR18,
  author       = {Pauline Bert and
                  Adeline Roux{-}Langlois},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {From Identification Using Rejection Sampling to Signatures via the
                  Fiat-Shamir Transform: Application to the {BLISS} Signature},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_19},
  doi          = {10.1007/978-3-319-97916-8\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BertR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/CianciulloG18,
  author       = {Louis Cianciullo and
                  Hossein Ghodosi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Improvements to Almost Optimum Secret Sharing with Cheating Detection},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_13},
  doi          = {10.1007/978-3-319-97916-8\_13},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CianciulloG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HashimotoIT18,
  author       = {Yasufumi Hashimoto and
                  Yasuhiko Ikematsu and
                  Tsuyoshi Takagi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt
                  2017},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_1},
  doi          = {10.1007/978-3-319-97916-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HashimotoIT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IguchiUF18,
  author       = {Makoto Iguchi and
                  Taro Uematsu and
                  Tatsuro Fujii},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {The Anatomy of the {HIPAA} Privacy Rule: {A} Risk-Based Approach as
                  a Remedy for Privacy-Preserving Data Sharing},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_12},
  doi          = {10.1007/978-3-319-97916-8\_12},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IguchiUF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ItoHYS18,
  author       = {Katsutaka Ito and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Detecting Privacy Information Abuse by Android Apps from {API} Call
                  Logs},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_10},
  doi          = {10.1007/978-3-319-97916-8\_10},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ItoHYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LaanPRRSV18,
  author       = {Ebo van der Laan and
                  Erik Poll and
                  Joost Rijneveld and
                  Joeri de Ruiter and
                  Peter Schwabe and
                  Jan Verschuren},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Is Java Card Ready for Hash-Based Signatures?},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_9},
  doi          = {10.1007/978-3-319-97916-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LaanPRRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LauT18,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Key Recovery Attack on McNie Based on Low Rank Parity Check Codes
                  and Its Reparation},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_2},
  doi          = {10.1007/978-3-319-97916-8\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LauT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiWL18,
  author       = {Qiuping Li and
                  Baofeng Wu and
                  Zhuojun Liu},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Lightweight Recursive {MDS} Matrices with Generalized Feistel Network},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {262--278},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_17},
  doi          = {10.1007/978-3-319-97916-8\_17},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnozawaKYN18,
  author       = {Sota Onozawa and
                  Noboru Kunihiro and
                  Masayuki Yoshino and
                  Ken Naganuma},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Inference Attacks on Encrypted Databases Based on Order Preserving
                  Assignment Problem},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_3},
  doi          = {10.1007/978-3-319-97916-8\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnozawaKYN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SaitoYSS18,
  author       = {Takamichi Saito and
                  Masahiro Yokoyama and
                  Shota Sugawara and
                  Kuniyasu Suzaki},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Safe Trans Loader: Mitigation and Prevention of Memory Corruption
                  Attacks for Released Binaries},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_5},
  doi          = {10.1007/978-3-319-97916-8\_5},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SaitoYSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki18,
  author       = {Yu Sasaki},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks:
                  Application to {GIFT}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_15},
  doi          = {10.1007/978-3-319-97916-8\_15},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sasaki18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShiY18,
  author       = {Cheng Shi and
                  Kazuki Yoneyama},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Verification of {LINE} Encryption Version 1.0 Using ProVerif},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_11},
  doi          = {10.1007/978-3-319-97916-8\_11},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShimaD18,
  author       = {Koji Shima and
                  Hiroshi Doi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {XOR-Based Hierarchical Secret Sharing Scheme},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_14},
  doi          = {10.1007/978-3-319-97916-8\_14},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShimaD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TadaUK18,
  author       = {Hayato Tada and
                  Akinaga Ueda and
                  Kaoru Kurosawa},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {How to Prove {KDM} Security of {BHHO}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_18},
  doi          = {10.1007/978-3-319-97916-8\_18},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TadaUK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UedaTK18,
  author       = {Akinaga Ueda and
                  Hayato Tada and
                  Kaoru Kurosawa},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {(Short Paper) How to Solve {DLOG} Problem with Auxiliary Input},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {104--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_7},
  doi          = {10.1007/978-3-319-97916-8\_7},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UedaTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangWTT18,
  author       = {Weiyao Wang and
                  Yuntao Wang and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Estimated Cost for Solving Generalized Learning with Errors Problem
                  via Embedding Techniques},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_6},
  doi          = {10.1007/978-3-319-97916-8\_6},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangWTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WiemersK18,
  author       = {Andreas Wiemers and
                  Dominik Klein},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Entropy Reduction for the Correlation-Enhanced Power Analysis Collision
                  Attack},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_4},
  doi          = {10.1007/978-3-319-97916-8\_4},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WiemersK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangLLW18,
  author       = {Jingchun Yang and
                  Meicheng Liu and
                  Dongdai Lin and
                  Wenhao Wang},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Symbolic-Like Computation and Conditional Differential Cryptanalysis
                  of {QUARK}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_16},
  doi          = {10.1007/978-3-319-97916-8\_16},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangLLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2018,
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8},
  doi          = {10.1007/978-3-319-97916-8},
  isbn         = {978-3-319-97915-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Al-FannahL17,
  author       = {Nasser Mohammed Al{-}Fannah and
                  Wanpeng Li},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_7},
  doi          = {10.1007/978-3-319-64200-0\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Al-FannahL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17,
  author       = {Saed Alsayigh and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_2},
  doi          = {10.1007/978-3-319-64200-0\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasLWC17,
  author       = {Ahto Buldas and
                  Aleksandr Lenin and
                  Jan Willemson and
                  Anton Charnamord},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Simple Infeasibility Certificates for Attack Trees},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {39--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_3},
  doi          = {10.1007/978-3-319-64200-0\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Fujioka17,
  author       = {Atsushi Fujioka},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Adaptive Security in Identity-Based Authenticated Key Agreement with
                  Multiple Private Key Generators},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_12},
  doi          = {10.1007/978-3-319-64200-0\_12},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Fujioka17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HosoyamadaA17,
  author       = {Akinori Hosoyamada and
                  Kazumaro Aoki},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_1},
  doi          = {10.1007/978-3-319-64200-0\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HosoyamadaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KondoSTI17,
  author       = {Kota Kondo and
                  Yu Sasaki and
                  Yosuke Todo and
                  Tetsu Iwata},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Analyzing Key Schedule of Simon: Iterative Key Differences and Application
                  to Related-Key Impossible Differentials},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_9},
  doi          = {10.1007/978-3-319-64200-0\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KondoSTI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuchtaSSBM17,
  author       = {Veronika Kuchta and
                  Gaurav Sharma and
                  Rajeev Anand Sahu and
                  Tarunpreet Bhatia and
                  Olivier Markowitch},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Secure Certificateless Proxy Re-encryption Without Pairing},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_6},
  doi          = {10.1007/978-3-319-64200-0\_6},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuchtaSSBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MauN17,
  author       = {Baptiste Vinh Mau and
                  Koji Nuida},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Correction of a Secure Comparison Protocol for Encrypted Integers
                  in {IEEE} {WIFS} 2012 (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {181--191},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_11},
  doi          = {10.1007/978-3-319-64200-0\_11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MauN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuVS17,
  author       = {Jiawei Su and
                  Danilo Vasconcellos Vargas and
                  Kouichi Sakurai},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Evasion Attacks Against Statistical Code Obfuscation Detectors},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_8},
  doi          = {10.1007/978-3-319-64200-0\_8},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XiaJY17,
  author       = {Bingqing Xia and
                  Dongyao Ji and
                  Gang Yao},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Enhanced {TLS} Handshake Authentication with Blockchain and Smart
                  Contract (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_4},
  doi          = {10.1007/978-3-319-64200-0\_4},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XiaJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMBRK17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Security Analysis of a Verifiable Server-Aided Approximate Similarity
                  Computation},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_10},
  doi          = {10.1007/978-3-319-64200-0\_10},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XueLL17,
  author       = {Haiyang Xue and
                  Bao Li and
                  Xianhui Lu},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {{IND-PCA} Secure {KEM} Is Enough for Password-Based Authenticated
                  Key Exchange (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {231--241},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_14},
  doi          = {10.1007/978-3-319-64200-0\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XueLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangFLW17,
  author       = {Daode Zhang and
                  Fuyang Fang and
                  Bao Li and
                  Xin Wang},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Deterministic Identity-Based Encryption from Lattices with More Compact
                  Public Parameters},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_13},
  doi          = {10.1007/978-3-319-64200-0\_13},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangFLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangH17,
  author       = {Rui Zhang and
                  Kai He},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Multipurpose Public-Key Encryption},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_5},
  doi          = {10.1007/978-3-319-64200-0\_5},
  timestamp    = {Sat, 19 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2017,
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0},
  doi          = {10.1007/978-3-319-64200-0},
  isbn         = {978-3-319-64199-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AguessyBBCD16,
  author       = {Fran{\c{c}}ois{-}Xavier Aguessy and
                  Olivier Bettan and
                  Gregory Blanc and
                  Vania Conan and
                  Herv{\'{e}} Debar},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Hybrid Risk Assessment Model Based on Bayesian Networks},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_2},
  doi          = {10.1007/978-3-319-44524-3\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BarenghiP16,
  author       = {Alessandro Barenghi and
                  Gerardo Pelosi},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {A Note on Fault Attacks Against Deterministic Signature Schemes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {182--192},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_11},
  doi          = {10.1007/978-3-319-44524-3\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeatoHM16,
  author       = {Filipe Beato and
                  Kimmo Halunen and
                  Bart Mennink},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Recipient Privacy in Online Social Networks},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {254--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_15},
  doi          = {10.1007/978-3-319-44524-3\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeatoHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ButinDB16,
  author       = {Denis Butin and
                  Denise Demirel and
                  Johannes Buchmann},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Formal Policy-Based Provenance Audit},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {234--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_14},
  doi          = {10.1007/978-3-319-44524-3\_14},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ButinDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DingKOTT16,
  author       = {Jintai Ding and
                  Momonari Kudo and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Chengdong Tao},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations
                  via Weighted {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {305--315},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_18},
  doi          = {10.1007/978-3-319-44524-3\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Yutaka Kawai and
                  Nori Matsuda and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Yusuke Sakai and
                  Tatsuji Munaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Simple, Secure, and Efficient Searchable Symmetric Encryption with
                  Multiple Encrypted Indexes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_6},
  doi          = {10.1007/978-3-319-44524-3\_6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JeongKPN16,
  author       = {Ji{-}Hoon Jeong and
                  Hyung Chan Kim and
                  Il Hwan Park and
                  Bong{-}Nam Noh},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Hooking Graceful Moments: {A} Security Analysis of Sudo Session Handling},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_3},
  doi          = {10.1007/978-3-319-44524-3\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JeongKPN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KawachiTT16,
  author       = {Akinori Kawachi and
                  Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Lower Bounds for Key Length of k-wise Almost Independent Permutations
                  and Certain Symmetric-Key Encryption Schemes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_12},
  doi          = {10.1007/978-3-319-44524-3\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KudoYGY16,
  author       = {Momonari Kudo and
                  Junpei Yamaguchi and
                  Yang Guo and
                  Masaya Yasuda},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Practical Analysis of Key Recovery Attack Against Search-LWE Problem},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_10},
  doi          = {10.1007/978-3-319-44524-3\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KudoYGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16,
  author       = {Kaoru Kurosawa and
                  Keisuke Sasaki and
                  Kiyohiko Ohta and
                  Kazuki Yoneyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_5},
  doi          = {10.1007/978-3-319-44524-3\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LinWJZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Chuankun Wu},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_1},
  doi          = {10.1007/978-3-319-44524-3\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/LinWJZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiTKU16,
  author       = {Hiroshi Onuki and
                  Tadanori Teruya and
                  Naoki Kanayama and
                  Shigenori Uchiyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Faster Explicit Formulae for Computing Pairings via Elliptic Nets
                  and Their Parallel Computation},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {319--334},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_19},
  doi          = {10.1007/978-3-319-44524-3\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiTKU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XiangZL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Dongdai Lin},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {On the Division Property of Simon48 and Simon64},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_9},
  doi          = {10.1007/978-3-319-44524-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XieTCZG16,
  author       = {Wei Xie and
                  Yong Tang and
                  Shuhui Chen and
                  Yi Zhang and
                  Yuanming Gao},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Security of Web of Things: {A} Survey},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_4},
  doi          = {10.1007/978-3-319-44524-3\_4},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XieTCZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yamamoto16,
  author       = {Hiroaki Yamamoto},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Secure Automata-Based Substring Search Scheme on Encrypted Data},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_7},
  doi          = {10.1007/978-3-319-44524-3\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yamamoto16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Related-Key Impossible Differential Analysis of Full Khudra},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_8},
  doi          = {10.1007/978-3-319-44524-3\_8},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YashiroMIS16,
  author       = {Risa Yashiro and
                  Takanori Machida and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Deep-Learning-Based Security Evaluation on Authentication Systems
                  Using Arbiter {PUF} and Its Variants},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_16},
  doi          = {10.1007/978-3-319-44524-3\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangCZL16,
  author       = {Tao Zhang and
                  Sherman S. M. Chow and
                  Zhe Zhou and
                  Ming Li},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_13},
  doi          = {10.1007/978-3-319-44524-3\_13},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangCZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangT16,
  author       = {Wenbin Zhang and
                  Chik How Tan},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {On the Security and Key Generation of the {ZHFE} Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_17},
  doi          = {10.1007/978-3-319-44524-3\_17},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2016,
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3},
  doi          = {10.1007/978-3-319-44524-3},
  isbn         = {978-3-319-44523-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EzakiDI15,
  author       = {Takaya Ezaki and
                  Tomohiro Date and
                  Hiroyuki Inoue},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {An Analysis Platform for the Information Security of In-Vehicle Networks
                  Connected with External Networks},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_18},
  doi          = {10.1007/978-3-319-22425-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EzakiDI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FangLLS15,
  author       = {Fuyang Fang and
                  Bao Li and
                  Xianhui Lu and
                  Xiaochao Sun},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improved Efficiency of {MP12}},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_12},
  doi          = {10.1007/978-3-319-22425-1\_12},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FangLLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HeLLJXS15,
  author       = {Jingnan He and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia and
                  Haiyang Xue and
                  Xiaochao Sun},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Identity-Based Lossy Encryption from Learning with Errors},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_1},
  doi          = {10.1007/978-3-319-22425-1\_1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HeLLJXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HoshinoO15,
  author       = {Hidetaka Hoshino and
                  Satoshi Obana},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Almost Optimum Secret Sharing Schemes with Cheating Detection for
                  Random Bit Strings},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_13},
  doi          = {10.1007/978-3-319-22425-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IkarashiKCT15,
  author       = {Dai Ikarashi and
                  Ryo Kikuchi and
                  Koji Chida and
                  Katsumi Takahashi},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {k-Anonymous Microdata Release via Post Randomisation Method},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_14},
  doi          = {10.1007/978-3-319-22425-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IkarashiKCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimT15,
  author       = {Taechan Kim and
                  Mehdi Tibouchi},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Invalid Curve Attacks in a {GLS} Setting},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_3},
  doi          = {10.1007/978-3-319-22425-1\_3},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuW15,
  author       = {Tong Liu and
                  Yazhe Wang},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Beyond Scale: An Efficient Framework for Evaluating Web Access Control
                  Policies in the Era of Big Data},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_19},
  doi          = {10.1007/978-3-319-22425-1\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MaLHL15,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256
                  and Studies on Several Truncation Patterns for AES-like Compression
                  Functions},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_6},
  doi          = {10.1007/978-3-319-22425-1\_6},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MaLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PengHLHX15,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Zhangjie Huang and
                  Jun Xu},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_5},
  doi          = {10.1007/978-3-319-22425-1\_5},
  timestamp    = {Sun, 10 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SadiahNF15,
  author       = {Shahidatul Sadiah and
                  Toru Nakanishi and
                  Nobuo Funabiki},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Anonymous Credential System with Efficient Proofs for Monotone Formulas
                  on Attributes},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {262--278},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_16},
  doi          = {10.1007/978-3-319-22425-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SadiahNF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SeoE15,
  author       = {Jae Hong Seo and
                  Keita Emura},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_2},
  doi          = {10.1007/978-3-319-22425-1\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SeoE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Secure Multi-Party Computation Using Polarizing Cards},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {281--297},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_17},
  doi          = {10.1007/978-3-319-22425-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SmythHM15,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani and
                  Hirofumi Muratani},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_8},
  doi          = {10.1007/978-3-319-22425-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SunHQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Jinyong Shan and
                  Ling Song},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement on the Method for Automatic Differential Analysis and
                  Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_7},
  doi          = {10.1007/978-3-319-22425-1\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TaketaniO15,
  author       = {Shunsuke Taketani and
                  Wakaha Ogata},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement of {UC} Secure Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_9},
  doi          = {10.1007/978-3-319-22425-1\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TaketaniO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TeruyaNSH15,
  author       = {Tadanori Teruya and
                  Koji Nuida and
                  Kana Shimizu and
                  Goichiro Hanaoka},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {On Limitations and Alternatives of Privacy-Preserving Cryptographic
                  Protocols for Genomic Data},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_15},
  doi          = {10.1007/978-3-319-22425-1\_15},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TeruyaNSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangWL15,
  author       = {Fuqun Wang and
                  Kunpeng Wang and
                  Bao Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {LWE-Based {FHE} with Better Parameters},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_11},
  doi          = {10.1007/978-3-319-22425-1\_11},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YagasakiS15,
  author       = {Reina Yagasaki and
                  Kazuo Sakiyama},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_20},
  doi          = {10.1007/978-3-319-22425-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YuKJ15,
  author       = {Wei Yu and
                  Kwang Ho Kim and
                  Myong Song Jo},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {56--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_4},
  doi          = {10.1007/978-3-319-22425-1\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YuKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangL15,
  author       = {Tingting Zhang and
                  Hongda Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Fully Leakage-Resilient Non-malleable Identification Schemes in the
                  Bounded-Retrieval Model},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_10},
  doi          = {10.1007/978-3-319-22425-1\_10},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {347--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_21},
  doi          = {10.1007/978-3-319-22425-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2015,
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1},
  doi          = {10.1007/978-3-319-22425-1},
  isbn         = {978-3-319-22424-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AkagiN14,
  author       = {Shoichi Akagi and
                  Yasuyuki Nogami},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Exponentiation Inversion Problem Reduced from Fixed Argument Pairing
                  Inversion on Twistable Ate Pairing and Its Difficulty},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {240--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_18},
  doi          = {10.1007/978-3-319-09843-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AkagiN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BayHV14,
  author       = {Asl{\'{\i}} Bay and
                  Jialin Huang and
                  Serge Vaudenay},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Improved Linear Cryptanalysis of Reduced-Round {MIBS}},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {204--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_16},
  doi          = {10.1007/978-3-319-09843-2\_16},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BayHV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChangHHYWC14,
  author       = {Yun{-}An Chang and
                  Wei{-}Chih Hong and
                  Ming{-}Chun Hsiao and
                  Bo{-}Yin Yang and
                  An{-}Yeu Wu and
                  Chen{-}Mou Cheng},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor
                  Supporting Elliptic-Curve Pairings over Fields of Large Characteristics},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_14},
  doi          = {10.1007/978-3-319-09843-2\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChangHHYWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChatterjeeM14,
  author       = {Sanjit Chatterjee and
                  Sayantan Mukherjee},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Framework for Efficient Search and Statistics Computation on Encrypted
                  Cloud Data},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {276--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_21},
  doi          = {10.1007/978-3-319-09843-2\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChatterjeeM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DattaN14,
  author       = {Nilanjan Datta and
                  Mridul Nandi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Characterization of {EME} with Linear Mixing},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {221--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_17},
  doi          = {10.1007/978-3-319-09843-2\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/DattaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DuttaP14,
  author       = {Avijit Dutta and
                  Goutam Paul},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Deterministic Hard Fault Attack on Trivium},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_11},
  doi          = {10.1007/978-3-319-09843-2\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DuttaP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EndoK14,
  author       = {Kosei Endo and
                  Noboru Kunihiro},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {On the Security Proof of an Authentication Protocol from Eurocrypt
                  2011},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_15},
  doi          = {10.1007/978-3-319-09843-2\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EndoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EvciK14,
  author       = {Muhammet Ali Evci and
                  Sel{\c{c}}uk Kavut},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {{DPA} Resilience of Rotation-Symmetric S-boxes},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_12},
  doi          = {10.1007/978-3-319-09843-2\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EvciK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HajnyMT14,
  author       = {Jan Hajny and
                  Lukas Malina and
                  Ondrej Tethal},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Privacy-Friendly Access Control Based on Personal Attributes},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_1},
  doi          = {10.1007/978-3-319-09843-2\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HajnyMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JiaLLM14,
  author       = {Dingding Jia and
                  Bao Li and
                  Xianhui Lu and
                  Qixiang Mei},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Related Key Secure {PKE} from Hash Proof Systems},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {250--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_19},
  doi          = {10.1007/978-3-319-09843-2\_19},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JiaLLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KrotofilL14,
  author       = {Marina Krotofil and
                  Jason Larsen},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Are You Threatening My Hazards?},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_2},
  doi          = {10.1007/978-3-319-09843-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KrotofilL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ObanaT14,
  author       = {Satoshi Obana and
                  Kazuya Tsuchida},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary
                  Finite Field},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {88--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_7},
  doi          = {10.1007/978-3-319-09843-2\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Ohata0HM14,
  author       = {Satsuya Ohata and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {More Constructions of Re-splittable Threshold Public Key Encryption},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {109--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_9},
  doi          = {10.1007/978-3-319-09843-2\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Ohata0HM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PalmieriP14,
  author       = {Paolo Palmieri and
                  Johan A. Pouwelse},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Key Management for Onion Routing in a True Peer to Peer Setting},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {62--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_5},
  doi          = {10.1007/978-3-319-09843-2\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PalmieriP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY14,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Complicating Process Identification by Replacing Process Information
                  for Attack Avoidance},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_3},
  doi          = {10.1007/978-3-319-09843-2\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzakiYKI14,
  author       = {Kuniyasu Suzaki and
                  Toshiki Yagi and
                  Kazukuni Kobara and
                  Toshiaki Ishiyama},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Kernel Memory Protection by an Insertable Hypervisor Which Has {VM}
                  Introspection and Stealth Breakpoints},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {48--61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_4},
  doi          = {10.1007/978-3-319-09843-2\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzakiYKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiY14,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Secure Multi-Party Computation for Elliptic Curves},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {98--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_8},
  doi          = {10.1007/978-3-319-09843-2\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TsengCL14,
  author       = {Fu{-}Kuo Tseng and
                  Rong{-}Jaye Chen and
                  Bao{-}Shuh Paul Lin},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Towards Symmetric Functional Encryption for Regular Languages with
                  Predicate Privacy},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_20},
  doi          = {10.1007/978-3-319-09843-2\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TsengCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT14,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_6},
  doi          = {10.1007/978-3-319-09843-2\_6},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YamamotoTST14,
  author       = {Dai Yamamoto and
                  Masahiko Takenaka and
                  Kazuo Sakiyama and
                  Naoya Torii},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {A Technique Using PUFs for Protecting Circuit Layout Designs against
                  Reverse Engineering},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_13},
  doi          = {10.1007/978-3-319-09843-2\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Zhang14,
  author       = {Hailong Zhang},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {How to Effectively Decrease the Resource Requirement in Template Attack?},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_10},
  doi          = {10.1007/978-3-319-09843-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2014,
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2},
  doi          = {10.1007/978-3-319-09843-2},
  isbn         = {978-3-319-09842-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0002H13,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Achieving Chosen Ciphertext Security from Detectable Public Key Encryption
                  Efficiently via Hybrid Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_15},
  doi          = {10.1007/978-3-642-41383-4\_15},
  timestamp    = {Sun, 04 Aug 2024 19:41:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/0002H13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DengZCS13,
  author       = {Yi Deng and
                  Yang Zhang and
                  Liang Cheng and
                  Xiaoshan Sun},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Static Integer Overflow Vulnerability Detection in Windows Binary},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_2},
  doi          = {10.1007/978-3-642-41383-4\_2},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/DengZCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Hashimoto13,
  author       = {Yasufumi Hashimoto},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Cryptanalysis of the Quaternion Rainbow},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_16},
  doi          = {10.1007/978-3-642-41383-4\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Hashimoto13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HigoTY13,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Game-Theoretic Security for Bit Commitment},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_20},
  doi          = {10.1007/978-3-642-41383-4\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHIM13,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Takashi Ito and
                  Nori Matsuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics
                  Based on Public-Key Homomorphic Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_12},
  doi          = {10.1007/978-3-642-41383-4\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuangPST13,
  author       = {Yun{-}Ju Huang and
                  Christophe Petit and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_8},
  doi          = {10.1007/978-3-642-41383-4\_8},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IsshikiNT13,
  author       = {Toshiyuki Isshiki and
                  Manh Ha Nguyen and
                  Keisuke Tanaka},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_19},
  doi          = {10.1007/978-3-642-41383-4\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KiyomuraT13,
  author       = {Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Efficient Algorithm for Tate Pairing of Composite Order},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_13},
  doi          = {10.1007/978-3-642-41383-4\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaU13,
  author       = {Kaoru Kurosawa and
                  Takuma Ueda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod
                  2t{\textdollar}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {217--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_14},
  doi          = {10.1007/978-3-642-41383-4\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MoreiraFK13,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias
                  Probability Spaces},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_4},
  doi          = {10.1007/978-3-642-41383-4\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NaitoSWY13,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Lei Wang and
                  Kan Yasuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_6},
  doi          = {10.1007/978-3-642-41383-4\_6},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OgataKKM13,
  author       = {Wakaha Ogata and
                  Keita Koiwa and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Toward Practical Searchable Symmetric Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_10},
  doi          = {10.1007/978-3-642-41383-4\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OgataKKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PalmieriP13,
  author       = {Paolo Palmieri and
                  Olivier Pereira},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Unconditionally Secure Oblivious Transfer from Real Network Behavior},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {168--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_11},
  doi          = {10.1007/978-3-642-41383-4\_11},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PalmieriP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SanoOO13,
  author       = {Shotaro Sano and
                  Takuma Otsuka and
                  Hiroshi G. Okuno},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Solving Google's Continuous Audio {CAPTCHA} with HMM-Based Automatic
                  Speech Recognition},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_3},
  doi          = {10.1007/978-3-642-41383-4\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SanoOO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY13,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Secure Log Transfer by Replacing a Library in a Virtual Machine},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_1},
  doi          = {10.1007/978-3-642-41383-4\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TahaS13,
  author       = {Mostafa M. I. Taha and
                  Patrick Schaumont},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Differential Power Analysis of MAC-Keccak at Any Key-Length},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_5},
  doi          = {10.1007/978-3-642-41383-4\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TahaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TodoS13,
  author       = {Yosuke Todo and
                  Yu Sasaki},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its
                  Application to {DFA}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_7},
  doi          = {10.1007/978-3-642-41383-4\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TodoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TsengLCL13,
  author       = {Fu{-}Kuo Tseng and
                  Yung{-}Hsiang Liu and
                  Rong{-}Jaye Chen and
                  Bao{-}Shuh Paul Lin},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Statistics on Encrypted Cloud Data},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_9},
  doi          = {10.1007/978-3-642-41383-4\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TsengLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT13,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing
                  Adversary},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {258--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_17},
  doi          = {10.1007/978-3-642-41383-4\_17},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {One-Round Authenticated Key Exchange without Implementation Trick},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_18},
  doi          = {10.1007/978-3-642-41383-4\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4},
  doi          = {10.1007/978-3-642-41383-4},
  isbn         = {978-3-642-41382-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0007SSO12,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash
                  Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_11},
  doi          = {10.1007/978-3-642-34117-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChenJKLPS12,
  author       = {Chien{-}Ning Chen and
                  Nisha Jacob and
                  Sebastian Kutzner and
                  San Ling and
                  Axel Poschmann and
                  Sirote Saetang},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Standardized Signature Algorithms on Ultra-constrained 4-Bit {MCU}},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {37--50},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_3},
  doi          = {10.1007/978-3-642-34117-5\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChenJKLPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IsobeOM12,
  author       = {Takanori Isobe and
                  Toshihiro Ohigashi and
                  Masakatu Morii},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Slide Cryptanalysis of Lightweight Stream Cipher {RAKAPOSHI}},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_9},
  doi          = {10.1007/978-3-642-34117-5\_9},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/IsobeOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JingAH12,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Model-Based Conformance Testing for Android},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_1},
  doi          = {10.1007/978-3-642-34117-5\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JingAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KawachiTT12,
  author       = {Akinori Kawachi and
                  Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_8},
  doi          = {10.1007/978-3-642-34117-5\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KawachiTT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KiyoshimaMO12,
  author       = {Susumu Kiyoshima and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation
                  Security},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {216--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_14},
  doi          = {10.1007/978-3-642-34117-5\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KiyoshimaMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LuWPF12,
  author       = {Jiqiang Lu and
                  Yongzhuang Wei and
                  Enes Pasalic and
                  Pierre{-}Alain Fouque},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block
                  Cipher},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {197--215},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_13},
  doi          = {10.1007/978-3-642-34117-5\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/LuWPF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NekadoNI12,
  author       = {Kenta Nekado and
                  Yasuyuki Nogami and
                  Kengo Iokibe},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Very Short Critical Path Implementation of {AES} with Direct Logic
                  Gates},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_4},
  doi          = {10.1007/978-3-642-34117-5\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NekadoNI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PohMZ12,
  author       = {Geong Sen Poh and
                  Moesfa Soeheila Mohamad and
                  Muhammad Reza Z'aba},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Structured Encryption for Conceptual Graphs},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_7},
  doi          = {10.1007/978-3-642-34117-5\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PohMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Yasuhiro Takasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Boomerang Distinguishers for Full {HAS-160} Compression Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_10},
  doi          = {10.1007/978-3-642-34117-5\_10},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiYF12,
  author       = {Itsuki Suzuki and
                  Maki Yoshida and
                  Toru Fujiwara},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Generic Construction of {GUC} Secure Commitment in the {KRK} Model},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_16},
  doi          = {10.1007/978-3-642-34117-5\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/VivekSR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Compact Stateful Encryption Schemes with Ciphertext Verifiability},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_6},
  doi          = {10.1007/978-3-642-34117-5\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/VivekSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangCZ12,
  author       = {Jingjing Wang and
                  Kefei Chen and
                  Shixiong Zhu},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Annihilators of Fast Discrete Fourier Spectra Attacks},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {182--196},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_12},
  doi          = {10.1007/978-3-642-34117-5\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YasudaTS12,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Application of Scalar Multiplication of Edwards Curves to Pairing-Based
                  Cryptography},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_2},
  doi          = {10.1007/978-3-642-34117-5\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YasudaTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama12,
  author       = {Kazuki Yoneyama},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in
                  the Standard Model against Constrained Adversary},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_5},
  doi          = {10.1007/978-3-642-34117-5\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yoneyama12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhuTH12,
  author       = {Youwen Zhu and
                  Tsuyoshi Takagi and
                  Liusheng Huang},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Efficient Secure Primitive for Privacy Preserving Distributed Computations},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_15},
  doi          = {10.1007/978-3-642-34117-5\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhuTH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2012,
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5},
  doi          = {10.1007/978-3-642-34117-5},
  isbn         = {978-3-642-34116-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Fujioka11,
  author       = {Atsushi Fujioka},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Characterization of Strongly Secure Authenticated Key Exchanges without
                  {NAXOS} Technique},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_3},
  doi          = {10.1007/978-3-642-25141-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Fujioka11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HayashiMYFO11,
  author       = {Ryotaro Hayashi and
                  Tatsuyuki Matsushita and
                  Takuya Yoshida and
                  Yoshihiro Fujii and
                  Koji Okada},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy
                  Re-Encryption},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {210--229},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_14},
  doi          = {10.1007/978-3-642-25141-2\_14},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HayashiMYFO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Kuribayashi11,
  author       = {Minoru Kuribayashi},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_1},
  doi          = {10.1007/978-3-642-25141-2\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Kuribayashi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MitsunagaMO11,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_4},
  doi          = {10.1007/978-3-642-25141-2\_4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MitsunagaMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NuidaAKMN11,
  author       = {Koji Nuida and
                  Takuro Abe and
                  Shizuo Kaji and
                  Toshiaki Maeno and
                  Yasuhide Numata},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {A Mathematical Problem for Security Analysis of Hash Functions and
                  Pseudorandom Generators},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {144--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_10},
  doi          = {10.1007/978-3-642-25141-2\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NuidaAKMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OguraKUO11,
  author       = {Naoki Ogura and
                  Naoki Kanayama and
                  Shigenori Uchiyama and
                  Eiji Okamoto},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Cryptographic Pairings Based on Elliptic Nets},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_5},
  doi          = {10.1007/978-3-642-25141-2\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OguraKUO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PaulMR11,
  author       = {Goutam Paul and
                  Subhamoy Maitra and
                  Shashwat Raizada},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {A Theoretical Analysis of the Structure of {HC-128}},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_11},
  doi          = {10.1007/978-3-642-25141-2\_11},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/PaulMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PfohSE11,
  author       = {Jonas Pfoh and
                  Christian A. Schneider and
                  Claudia Eckert},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Nitro: Hardware-Based System Call Tracing for Virtual Machines},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {96--112},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_7},
  doi          = {10.1007/978-3-642-25141-2\_7},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/PfohSE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PortokalidisK11,
  author       = {Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {{REASSURE:} {A} Self-contained Mechanism for Healing Software Using
                  Rescue Points},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_2},
  doi          = {10.1007/978-3-642-25141-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PortokalidisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakaiEHKO11,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yutaka Kawai and
                  Kazumasa Omote},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Towards Restricting Plaintext Space in Public Key Encryption},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {193--209},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_13},
  doi          = {10.1007/978-3-642-25141-2\_13},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakaiEHKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiTSO11,
  author       = {Yu Sasaki and
                  Naoyuki Takayanagi and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Experimental Verification of Super-Sbox Analysis - Confirmation of
                  Detailed Attack Complexity},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_12},
  doi          = {10.1007/978-3-642-25141-2\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SelviVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Identity-Based Deterministic Signature Scheme without Forking-Lemma},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {79--95},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_6},
  doi          = {10.1007/978-3-642-25141-2\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SelviVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShojaeiML11,
  author       = {Maryam Shojaei and
                  Naser Movahhedinia and
                  Behrouz Tork Ladani},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {An Entropy Based Approach for DDoS Attack Detection in {IEEE} 802.16
                  Based Networks},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_9},
  doi          = {10.1007/978-3-642-25141-2\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShojaeiML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZavouPK11,
  author       = {Angeliki Zavou and
                  Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Taint-Exchange: {A} Generic System for Cross-Process and Cross-Host
                  Taint Tracking},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_8},
  doi          = {10.1007/978-3-642-25141-2\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZavouPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2011,
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2},
  doi          = {10.1007/978-3-642-25141-2},
  isbn         = {978-3-642-25140-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AlicherryK10,
  author       = {Mansoor Alicherry and
                  Angelos D. Keromytis},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Securing {MANET} Multicast Using {DIPLOMA}},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {232--250},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_16},
  doi          = {10.1007/978-3-642-16825-3\_16},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlicherryK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BangdaoRKN10,
  author       = {Chen Bangdao and
                  A. W. Roscoe and
                  Ronald Kainda and
                  Long Hoang Nguyen},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {The Missing Link: Human Interactive Security Protocols in Mobile Payment},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {94--109},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BangdaoRKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BardakHMS10,
  author       = {Ulas Bardak and
                  Seiya Hasegawa and
                  Kazuko Mishima and
                  Takayuki Saito},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Automated Scheduling of Volunteers through Adapting a Nurse Scheduling
                  Infrastructure},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {110--120},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BardakHMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BiskupT10,
  author       = {Joachim Biskup and
                  Cornelia Tadros},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Policy-Based Secrecy in the Runs {\&} Systems Framework and Controlled
                  Query Evaluation},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {60--77},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BiskupT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Bohme10,
  author       = {Rainer B{\"{o}}hme},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Security Metrics and Security Investment Models},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {10--24},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_2},
  doi          = {10.1007/978-3-642-16825-3\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Bohme10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/CalafateCNMC10,
  author       = {Carlos Miguel Tavares Calafate and
                  Javier Campos and
                  Marga N{\'{a}}cher and
                  Pietro Manzoni and
                  Juan{-}Carlos Cano},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {{A-HIP:} {A} Solution Offering Secure and Anonymous Communications
                  in MANETs},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_15},
  doi          = {10.1007/978-3-642-16825-3\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CalafateCNMC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EmuraHS10,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Group Signature Implies {PKE} with Non-interactive Opening and Threshold
                  {PKE}},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {181--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_13},
  doi          = {10.1007/978-3-642-16825-3\_13},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EmuraHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FujiokaSY10,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_12},
  doi          = {10.1007/978-3-642-16825-3\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FujiokaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FukaseY10,
  author       = {Masaharu Fukase and
                  Kazunori Yamaguchi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Exhaustive Search for Finding a Very Short Vector in High-Dimensional
                  Lattices},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {26--41},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FukaseY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HalunenR10,
  author       = {Kimmo Halunen and
                  Juha R{\"{o}}ning},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Preimage Attacks against Variants of Very Smooth Hash},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_17},
  doi          = {10.1007/978-3-642-16825-3\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HalunenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HarjumaaT10,
  author       = {Lasse Harjumaa and
                  Ilkka Tervonen},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Introducing Mitigation Use Cases to Enhance the Scope of Test Cases},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {337--353},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_23},
  doi          = {10.1007/978-3-642-16825-3\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HarjumaaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Hashimoto10,
  author       = {Yasufumi Hashimoto},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {On Small Secret Key Attack against {RSA} with High Bits Known Prime
                  Factor},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {14--25},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Hashimoto10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10,
  author       = {Tadashi Iyama and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Tsuyoshi Takagi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Implementation of Pairing on {BREW} Mobile Phones},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_22},
  doi          = {10.1007/978-3-642-16825-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IzuTY10,
  author       = {Tetsuya Izu and
                  Masahiko Takenaka and
                  Takashi Yoshioka},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Prototype System for Ensuring Integrity of Extracted Video Data
                  (Extended Abstract)},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {121--131},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IzuTY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IzumidaFM10,
  author       = {Tomonori Izumida and
                  Kokichi Futatsugi and
                  Akira Mori},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Generic Binary Analysis Method for Malware},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_14},
  doi          = {10.1007/978-3-642-16825-3\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IzumidaFM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JiangHDS10,
  author       = {Xin Jiang and
                  Lei Hu and
                  Jintai Ding and
                  Siwei Sun},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {On the Kipnis-Shamir Method Solving the MinRank Problem},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {1--13},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JustusL10,
  author       = {Benjamin Justus and
                  Daniel Loebenberger},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Differential Addition in Generalized Edwards Coordinates},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {316--325},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_21},
  doi          = {10.1007/978-3-642-16825-3\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JustusL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KlonowskiPSS10,
  author       = {Marek Klonowski and
                  Michal Przykucki and
                  Tomasz Struminski and
                  Malgorzata Sulkowska},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Practical Universal Random Sampling},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {84--100},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_7},
  doi          = {10.1007/978-3-642-16825-3\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/KlonowskiPSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Kuribayashi10,
  author       = {Minoru Kuribayashi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Experimental Assessment of Probabilistic Fingerprinting Codes over
                  {AWGN} Channel},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_9},
  doi          = {10.1007/978-3-642-16825-3\_9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Kuribayashi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LeB10,
  author       = {Thanh{-}Ha Le and
                  Ma{\"{e}}l Berthier},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Mutual Information Analysis under the View of Higher-Order Statistics},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {285--300},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_19},
  doi          = {10.1007/978-3-642-16825-3\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LeB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuLLZ10,
  author       = {Yamin Liu and
                  Bao Li and
                  Xianhui Lu and
                  Yazhe Zhang},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {{PA1} and {IND-CCA2} Do Not Guarantee {PA2:} Brief Examples},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_4},
  doi          = {10.1007/978-3-642-16825-3\_4},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuLLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MaitraSS10,
  author       = {Subhamoy Maitra and
                  Santanu Sarkar and
                  Sourav Sen Gupta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Publishing Upper Half of {RSA} Decryption Exponent},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_3},
  doi          = {10.1007/978-3-642-16825-3\_3},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/MaitraSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MitsunagaMO10,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_11},
  doi          = {10.1007/978-3-642-16825-3\_11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MitsunagaMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Niitsoo10,
  author       = {Margus Niitsoo},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Optimal Adversary Behavior for the Serial Model of Financial Attack
                  Trees},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {354--370},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_24},
  doi          = {10.1007/978-3-642-16825-3\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Niitsoo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OguraYKU10,
  author       = {Naoki Ogura and
                  Go Yamamoto and
                  Tetsutaro Kobayashi and
                  Shigenori Uchiyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {An Improvement of Key Generation Algorithm for Gentry's Homomorphic
                  Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_6},
  doi          = {10.1007/978-3-642-16825-3\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OguraYKU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakaiHKO10,
  author       = {Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kaoru Kurosawa and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs
                  in the {RO} Model},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_5},
  doi          = {10.1007/978-3-642-16825-3\_5},
  timestamp    = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki10,
  author       = {Yu Sasaki},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening
                  \emph{ShiftRow} Parameter},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_20},
  doi          = {10.1007/978-3-642-16825-3\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sasaki10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatohU10,
  author       = {Fumiko Satoh and
                  Naohiko Uramoto},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Validating Security Policy Conformance with WS-Security Requirements},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_10},
  doi          = {10.1007/978-3-642-16825-3\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatohU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sjoblom10,
  author       = {Olli Sj{\"{o}}blom},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Data Mining in Aviation Safety},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {132--148},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sjoblom10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Vaidya10,
  author       = {Jaideep Vaidya},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Automating Security Configuration and Administration: An Access Control
                  Perspective},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_1},
  doi          = {10.1007/978-3-642-16825-3\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Vaidya10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Wiese10,
  author       = {Lena Wiese},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality
                  Constraints},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_8},
  doi          = {10.1007/978-3-642-16825-3\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Wiese10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YajimaS10,
  author       = {Jun Yajima and
                  Takeshi Shimoyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Matrix Representation of Conditions for the Collision Attack of {SHA-1}
                  and Its Application to the Message Modification},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_18},
  doi          = {10.1007/978-3-642-16825-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YajimaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10,
  author       = {Kazuki Yoneyama and
                  Masayuki Terada and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
                  Environments},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {42--59},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoshihamaMM10,
  author       = {Sachiko Yoshihama and
                  Takuya Mishina and
                  Tsutomu Matsumoto},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Web-Based Data Leakage Prevention},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {78--93},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoshihamaMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3},
  doi          = {10.1007/978-3-642-16825-3},
  isbn         = {978-3-642-16824-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010s,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  isbn         = {978-4-915256-78-3},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/CheongK09,
  author       = {Kai{-}Yuen Cheong and
                  Takeshi Koshiba},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Reducing Complexity Assumptions for Oblivious Transfer},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {110--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_8},
  doi          = {10.1007/978-3-642-04846-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CheongK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChoyY09,
  author       = {Jiali Choy and
                  Huihui Yap},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Impossible Boomerang Attack for Block Cipher Structures},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {22--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_3},
  doi          = {10.1007/978-3-642-04846-3\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChoyY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuaLSR09,
  author       = {Jingyu Hua and
                  Mingchu Li and
                  Kouichi Sakurai and
                  Yizhi Ren},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Efficient Intrusion Detection Based on Static Analysis and Stack Walks},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_11},
  doi          = {10.1007/978-3-642-04846-3\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuaLSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JakubowskiSV09,
  author       = {Mariusz H. Jakubowski and
                  Chit Wei Saw and
                  Ramarathnam Venkatesan},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Tamper-Tolerant Software: Modeling and Implementation},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_9},
  doi          = {10.1007/978-3-642-04846-3\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JakubowskiSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimFU09,
  author       = {Minkyu Kim and
                  Atsushi Fujioka and
                  Berkant Ustaoglu},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Strongly Secure Authenticated Key Exchange without NAXOS' Approach},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_12},
  doi          = {10.1007/978-3-642-04846-3\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimFU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakaiMKM09,
  author       = {Yasumasa Nakai and
                  Takahiro Matsuda and
                  Wataru Kitada and
                  Kanta Matsuura},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {A Generic Construction of Timed-Release Encryption with Pre-open Capability},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_5},
  doi          = {10.1007/978-3-642-04846-3\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakaiMKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Nuida09,
  author       = {Koji Nuida},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and
                  Its Security Evaluation},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_10},
  doi          = {10.1007/978-3-642-04846-3\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Nuida09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Preneel09,
  author       = {Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {The Future of Cryptographic Algorithms},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_1},
  doi          = {10.1007/978-3-642-04846-3\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Preneel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakashitaSYTOKN09,
  author       = {Taiki Sakashita and
                  Yoichi Shibata and
                  Takumi Yamamoto and
                  Kenta Takahashi and
                  Wakaha Ogata and
                  Hiroaki Kikuchi and
                  Masakatsu Nishigaki},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {A Proposal of Efficient Remote Biometric Authentication Protocol},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {212--227},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_14},
  doi          = {10.1007/978-3-642-04846-3\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakashitaSYTOKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SekarP09,
  author       = {Gautham Sekar and
                  Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Improved Distinguishing Attacks on {HC-256}},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {38--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_4},
  doi          = {10.1007/978-3-642-04846-3\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SekarP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SelviVSR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Rahul Srinivasan and
                  Chandrasekaran Pandu Rangan},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_6},
  doi          = {10.1007/978-3-642-04846-3\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SelviVSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Universal Designated Verifier Signatures with Threshold-Signers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {89--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_7},
  doi          = {10.1007/978-3-642-04846-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_2},
  doi          = {10.1007/978-3-642-04846-3\_2},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YiTO09,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {ID-Based Group Password-Authenticated Key Exchange},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_13},
  doi          = {10.1007/978-3-642-04846-3\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/YiTO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3},
  doi          = {10.1007/978-3-642-04846-3},
  isbn         = {978-3-642-04845-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AnPP08,
  author       = {Dong Chan An and
                  So Mi Park and
                  Seog Park},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Efficient Secure Labeling Method under Dynamic {XML} Data Streams},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_17},
  doi          = {10.1007/978-3-540-89598-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AnPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BazinBM08,
  author       = {Cyril Bazin and
                  Jean{-}Marie Le Bars and
                  Jacques Madelaine},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {A Novel Framework for Watermarking: The Data-Abstracted Approach},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_13},
  doi          = {10.1007/978-3-540-89598-5\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BazinBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BringerCPZ08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {An Application of the Boneh and Shacham Group Signature Scheme to
                  Biometric Authentication},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_15},
  doi          = {10.1007/978-3-540-89598-5\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/CaryJJV08,
  author       = {Matthew Cary and
                  Matthias Jacob and
                  Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {The Long-Short-Key Primitive and Its Applications to Key Security},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {279--297},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_19},
  doi          = {10.1007/978-3-540-89598-5\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CaryJJV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChidaT08,
  author       = {Koji Chida and
                  Katsumi Takahashi},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Privacy Preserving Computations without Public Key Cryptographic Operation},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {184--200},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_12},
  doi          = {10.1007/978-3-540-89598-5\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChidaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Grzeskowiak08,
  author       = {Maciej Grzeskowiak},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {On Generating Elements of Orders Dividing p\({}^{\mbox{2k}}\){\(\pm\)}p\({}^{\mbox{k}}\)+1},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_1},
  doi          = {10.1007/978-3-540-89598-5\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Grzeskowiak08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/GuoMC08,
  author       = {Fuchun Guo and
                  Yi Mu and
                  Zhide Chen},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Efficient Batch Verification of Short Signatures for a Single-Signer
                  Setting without Random Oracles},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_4},
  doi          = {10.1007/978-3-540-89598-5\_4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/GuoMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HanaokaIOW08,
  author       = {Goichiro Hanaoka and
                  Hideki Imai and
                  Kazuto Ogawa and
                  Hajime Watanabe},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Chosen Ciphertext Secure Public Key Encryption with a Simple Structure},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_2},
  doi          = {10.1007/978-3-540-89598-5\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HanaokaIOW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HoriSST08,
  author       = {Yohei Hori and
                  Akashi Satoh and
                  Hirofumi Sakane and
                  Kenji Toda},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Bitstream Encryption and Authentication Using {AES-GCM} in Dynamically
                  Reconfigurable Systems},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_18},
  doi          = {10.1007/978-3-540-89598-5\_18},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HoriSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JacobJNSV08,
  author       = {Matthias Jacob and
                  Mariusz H. Jakubowski and
                  Prasad Naldurg and
                  Chit Wei Saw and
                  Ramarathnam Venkatesan},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {The Superdiversifier: Peephole Individualization for Software Protection},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {100--120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_7},
  doi          = {10.1007/978-3-540-89598-5\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JacobJNSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LamCC08,
  author       = {Ieng{-}Fat Lam and
                  Kuan{-}Ta Chen and
                  Ling{-}Jyh Chen},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Involuntary Information Leakage in Social Network Services},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {167--183},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_11},
  doi          = {10.1007/978-3-540-89598-5\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LamCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LocastoBK08,
  author       = {Michael E. Locasto and
                  Matthew Burnside and
                  Angelos D. Keromytis},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Online Network Forensics for Automatic Repair Validation},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_9},
  doi          = {10.1007/978-3-540-89598-5\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LocastoBK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LocastoSCKS08,
  author       = {Michael E. Locasto and
                  Angelos Stavrou and
                  Gabriela F. Cretu and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Return Value Predictability Profiles for Self-healing},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {152--166},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_10},
  doi          = {10.1007/978-3-540-89598-5\_10},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LocastoSCKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Menezes08,
  author       = {Alfred Menezes},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {The Elliptic Curve Discrete Logarithm Problem: State of the Art},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_14},
  doi          = {10.1007/978-3-540-89598-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Menezes08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OguraU08,
  author       = {Naoki Ogura and
                  Shigenori Uchiyama},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Remarks on the Attack of Fouque et al. against the lIC Scheme},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_3},
  doi          = {10.1007/978-3-540-89598-5\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OguraU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ParkCLH08,
  author       = {Heewan Park and
                  Seokwoo Choi and
                  Hyun{-}il Lim and
                  Taisook Han},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Detecting Java Theft Based on Static {API} Trace Birthmark},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_8},
  doi          = {10.1007/978-3-540-89598-5\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ParkCLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SalaiwarakulR08,
  author       = {Anongporn Salaiwarakul and
                  Mark Ryan},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Analysis of a Biometric Authentication Protocol for Signature Creation
                  Application},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_16},
  doi          = {10.1007/978-3-540-89598-5\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SalaiwarakulR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Tan08,
  author       = {Chik How Tan},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Signcryption Scheme in Multi-user Setting without Random Oracles},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {64--82},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_5},
  doi          = {10.1007/978-3-540-89598-5\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Tan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoshidaO08,
  author       = {Takuya Yoshida and
                  Koji Okada},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {83--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_6},
  doi          = {10.1007/978-3-540-89598-5\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoshidaO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2008,
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5},
  doi          = {10.1007/978-3-540-89598-5},
  isbn         = {978-3-540-89597-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AnckaertJVB07,
  author       = {Bertrand Anckaert and
                  Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan and
                  Koen De Bosschere},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Run-Time Randomization to Mitigate Tampering},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_11},
  doi          = {10.1007/978-3-540-75651-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AnckaertJVB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AokiSU07,
  author       = {Kazumaro Aoki and
                  Takeshi Shimoyama and
                  Hiroki Ueda},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Experiments on the Linear Algebra Step in the Number Field Sieve},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {58--73},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_5},
  doi          = {10.1007/978-3-540-75651-4\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AokiSU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AthanasopoulosRAM07,
  author       = {Elias Athanasopoulos and
                  Mema Roussopoulos and
                  Kostas G. Anagnostakis and
                  Evangelos P. Markatos},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {{GAS:} Overloading a File Sharing Network as an Anonymizing System},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {365--379},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_25},
  doi          = {10.1007/978-3-540-75651-4\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AthanasopoulosRAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BressonMS07,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_20},
  doi          = {10.1007/978-3-540-75651-4\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasM07,
  author       = {Ahto Buldas and
                  Triinu M{\"{a}}gi},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Practical Security Analysis of E-Voting Systems},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_22},
  doi          = {10.1007/978-3-540-75651-4\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Caballero-GilC07,
  author       = {Pino Caballero{-}Gil and
                  C{\'{a}}ndido Caballero{-}Gil},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {A Global Authentication Scheme for Mobile Ad-Hoc Networks},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_8},
  doi          = {10.1007/978-3-540-75651-4\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Caballero-GilC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChidaSK07,
  author       = {Koji Chida and
                  Osamu Shionoiri and
                  Atsushi Kanai},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Secure Anonymous Communications with Practical Anonymity Revocation
                  Scheme},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {352--364},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_24},
  doi          = {10.1007/978-3-540-75651-4\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChidaSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FanH07,
  author       = {Chun{-}I Fan and
                  Vincent Shi{-}Ming Huang},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Anonymous Authentication Protocols with Credit-Based Chargeability
                  and Fair Privacy for Mobile Communications},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {412--427},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_28},
  doi          = {10.1007/978-3-540-75651-4\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FanH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HadaS07,
  author       = {Satoshi Hada and
                  Kouichi Sakurai},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key
                  Encryption into Public-Key Encryption},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_1},
  doi          = {10.1007/978-3-540-75651-4\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HadaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HayashiKM07,
  author       = {Naoki Hayashi and
                  Minoru Kuribayashi and
                  Masakatu Morii},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_3},
  doi          = {10.1007/978-3-540-75651-4\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HayashiKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Generic Certificateless Encryption in the Standard Model},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {278--291},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_19},
  doi          = {10.1007/978-3-540-75651-4\_19},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HurPY07,
  author       = {Junbeom Hur and
                  Chanil Park and
                  Hyunsoo Yoon},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {An Efficient Pre-authentication Scheme for {IEEE} 802.11-Based Vehicular
                  Networks},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_9},
  doi          = {10.1007/978-3-540-75651-4\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HurPY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JurgensonW07,
  author       = {Aivo J{\"{u}}rgenson and
                  Jan Willemson},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Processing Multi-parameter Attacktrees with Estimated Parameter Values},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {308--319},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_21},
  doi          = {10.1007/978-3-540-75651-4\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JurgensonW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KidaSST07,
  author       = {Koji Kida and
                  Hisashi Sakamoto and
                  Hideo Shimazu and
                  Hiroyuki Tarumi},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {InfoCage: {A} Development and Evaluation of Confidential File Lifetime
                  Monitoring Technology by Analyzing Events from File Systems and GUIs},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {246--261},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_17},
  doi          = {10.1007/978-3-540-75651-4\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KidaSST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimRSS07,
  author       = {Hyung Chan Kim and
                  Rudrapatna S. Ramakrishna and
                  Wook Shin and
                  Kouichi Sakurai},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Enforcement of Integrated Security Policy in Trusted Operating Systems},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {214--229},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_15},
  doi          = {10.1007/978-3-540-75651-4\_15},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KondoS07,
  author       = {Satoshi Kondo and
                  Naoshi Sato},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Botnet Traffic Detection Techniques by C{\&}C Session Classification
                  Using {SVM}},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_7},
  doi          = {10.1007/978-3-540-75651-4\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KondoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KutylowskiZ07,
  author       = {Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Verifiable Internet Voting Solving Secure Platform Problem},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_14},
  doi          = {10.1007/978-3-540-75651-4\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KutylowskiZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Layouni07,
  author       = {Mohamed Layouni},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Accredited Symmetrically Private Information Retrieval},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_18},
  doi          = {10.1007/978-3-540-75651-4\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Layouni07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LeuHJ07,
  author       = {Fang{-}Yie Leu and
                  Kai{-}Wei Hu and
                  Fuu{-}Cheng Jiang},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Intrusion Detection and Identification System Using Data Mining and
                  Forensic Techniques},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_10},
  doi          = {10.1007/978-3-540-75651-4\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LeuHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuCWM07,
  author       = {Dennis Y. W. Liu and
                  Shuang Chang and
                  Duncan S. Wong and
                  Yi Mu},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Nominative Signature from Ring Signature},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {396--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_27},
  doi          = {10.1007/978-3-540-75651-4\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuCWM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MishinaYK07,
  author       = {Takuya Mishina and
                  Sachiko Yoshihama and
                  Michiharu Kudo},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Fine-Grained Sticky Provenance Architecture for Office Documents},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {336--351},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_23},
  doi          = {10.1007/978-3-540-75651-4\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MishinaYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MiwaMEYS07,
  author       = {Shinsuke Miwa and
                  Toshiyuki Miyachi and
                  Masashi Eto and
                  Masashi Yoshizumi and
                  Yoichi Shinoda},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Design Issues of an Isolated Sandbox Used to Analyze Malwares},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_2},
  doi          = {10.1007/978-3-540-75651-4\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MiwaMEYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakajimaIT07,
  author       = {Toshiya Nakajima and
                  Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Reduction Optimal Trinomials for Efficient Software Implementation
                  of the eta\({}_{\mbox{T}}\) Pairing},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_4},
  doi          = {10.1007/978-3-540-75651-4\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakajimaIT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/RenLTY07,
  author       = {Yi Ren and
                  Min Luo and
                  Zukai Tang and
                  Lingqing Ye},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {A Composite Privacy Protection Model},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {380--395},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_26},
  doi          = {10.1007/978-3-540-75651-4\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/RenLTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinKI07,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Hideki Imai},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {444--458},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_30},
  doi          = {10.1007/978-3-540-75651-4\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinKI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiK07,
  author       = {Kazuhiro Suzuki and
                  Kaoru Kurosawa},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {How to Find Many Collisions of 3-Pass {HAVAL}},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {428--443},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_29},
  doi          = {10.1007/978-3-540-75651-4\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiMO07,
  author       = {Kazuhisa Suzuki and
                  Koichi Mouri and
                  Eiji Okubo},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {\emph{Salvia} : {A} Privacy-Aware Operating System for Prevention
                  of Data Leakage},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {230--245},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_16},
  doi          = {10.1007/978-3-540-75651-4\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TsangCS07,
  author       = {Patrick P. Tsang and
                  Sherman S. M. Chow and
                  Sean W. Smith},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Batch Pairing Delegation},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {74--90},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_6},
  doi          = {10.1007/978-3-540-75651-4\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/TsangCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ViejoSD07,
  author       = {Alexandre Viejo and
                  Francesc Seb{\'{e}} and
                  Josep Domingo{-}Ferrer},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Secure and Private Incentive-Based Advertisement Dissemination in
                  Mobile Ad Hoc Networks},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_13},
  doi          = {10.1007/978-3-540-75651-4\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ViejoSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YakutP07,
  author       = {Ibrahim Yakut and
                  Huseyin Polat},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Privacy-Preserving Eigentaste-Based Collaborative Filtering},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_12},
  doi          = {10.1007/978-3-540-75651-4\_12},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YakutP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2007,
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4},
  doi          = {10.1007/978-3-540-75651-4},
  isbn         = {978-3-540-75650-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AlvarezGMTV06,
  author       = {Anna V. {\'{A}}lvarez and
                  Karen A. Garc{\'{\i}}a and
                  Ra{\'{u}}l Monroy and
                  Luis A. Trejo and
                  Jes{\'{u}}s V{\'{a}}zquez},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Tool for Managing Security Policies in Organisations},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {378--388},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_27},
  doi          = {10.1007/11908739\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlvarezGMTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AuLYW06,
  author       = {Man Ho Au and
                  Joseph K. Liu and
                  Tsz Hon Yuen and
                  Duncan S. Wong},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {ID-Based Ring Signature Scheme Secure in the Standard Model},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_1},
  doi          = {10.1007/11908739\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AuLYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChenK06,
  author       = {Yi{-}Ming Chen and
                  Yung{-}Wei Kao},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Information Flow Query and Verification for Security Policy of Security-Enhanced
                  Linux},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_28},
  doi          = {10.1007/11908739\_28},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChenK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChoiPY06,
  author       = {Seung Geol Choi and
                  Kunsoo Park and
                  Moti Yung},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Short Traceable Signatures Based on Bilinear Pairings},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_7},
  doi          = {10.1007/11908739\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChoiPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DrangerSS06,
  author       = {Stephen Dranger and
                  Robert H. Sloan and
                  Jon A. Solworth},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {The Complexity of Discretionary Access Control},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {405--420},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_29},
  doi          = {10.1007/11908739\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DrangerSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/GarciaR06,
  author       = {Flavio D. Garcia and
                  Peter van Rossum},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Sound Computational Interpretation of Symbolic Hashes in the Standard
                  Model},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_3},
  doi          = {10.1007/11908739\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/GarciaR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HadaS06,
  author       = {Satoshi Hada and
                  Kouichi Sakurai},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Ciphertext-Auditable Public Key Encryption},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {308--321},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_22},
  doi          = {10.1007/11908739\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HadaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HoepmanHJOS06,
  author       = {Jaap{-}Henk Hoepman and
                  Engelbert Hubbers and
                  Bart Jacobs and
                  Martijn Oostdijk and
                  Ronny Wichers Schreur},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Crossing Borders: Security and Privacy Issues of the European e-Passport},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_11},
  doi          = {10.1007/11908739\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HoepmanHJOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JinLZQ06,
  author       = {Hai Jin and
                  Zhensong Liao and
                  Deqing Zou and
                  Weizhong Qiang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A New Approach to Hide Policy for Automated Trust Negotiation},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {168--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_12},
  doi          = {10.1007/11908739\_12},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JinLZQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KangISL06,
  author       = {In Koo Kang and
                  Dong{-}Hyuck Im and
                  Young{-}Ho Suh and
                  Heung{-}Kyu Lee},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Real-Time Watermark Embedding for High Resolution Video Watermarking},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {227--238},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_16},
  doi          = {10.1007/11908739\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KangISL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KempfWRG06,
  author       = {James Kempf and
                  Jonathan Wood and
                  Zulfikar Ramzan and
                  Craig Gentry},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {{IP} Address Authorization for Secure Address Proxying Using Multi-key
                  CGAs and Ring Signatures},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_14},
  doi          = {10.1007/11908739\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KempfWRG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimRCJ06,
  author       = {Mooseop Kim and
                  Jaecheol Ryou and
                  YongJe Choi and
                  Sungik Jun},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Low Power {AES} Hardware Architecture for Radio Frequency Identification},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {353--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_25},
  doi          = {10.1007/11908739\_25},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimRCJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KwonJL06,
  author       = {Jeong Ok Kwon and
                  Ik Rae Jeong and
                  Dong Hoon Lee},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Provably-Secure Two-Round Password-Authenticated Group Key Exchange
                  in the Standard Model},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_23},
  doi          = {10.1007/11908739\_23},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/KwonJL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KwonLM06,
  author       = {Young Chul Kwon and
                  Sang Won Lee and
                  Songchun Moon},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Personal Computer Privacy: Analysis for Korean {PC} Users},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_6},
  doi          = {10.1007/11908739\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KwonLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuSW06,
  author       = {Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Ring Signature with Designated Linkability},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_8},
  doi          = {10.1007/11908739\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MukhopadhyayS06,
  author       = {Sourav Mukhopadhyay and
                  Palash Sarkar},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {On the Effectiveness of {TMTO} and Exhaustive Search Attacks},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {337--352},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_24},
  doi          = {10.1007/11908739\_24},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MukhopadhyayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakanishiF06,
  author       = {Toru Nakanishi and
                  Nobuo Funabiki},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Short Verifier-Local Revocation Group Signature Scheme with Backward
                  Unlinkability},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_2},
  doi          = {10.1007/11908739\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakanishiF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NohKKN06,
  author       = {Sang{-}Kyun Noh and
                  DongKook Kim and
                  Yongmin Kim and
                  Bong{-}Nam Noh},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Modeling of Network Intrusions Based on the Multiple Transition Probability},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {278--291},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_20},
  doi          = {10.1007/11908739\_20},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NohKKN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnishiO06,
  author       = {Junji Onishi and
                  Tsukasa Ono},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Study of Detection Method of Printed Image Alteration Using Digital
                  Watermark},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_15},
  doi          = {10.1007/11908739\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnishiO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ParkCLC06,
  author       = {Sang{-}Hyun Park and
                  Hoon Choi and
                  Sang{-}Han Lee and
                  Taejoo Chang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {The High-Speed Packet Cipher System Suitable for Small Sized Data},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_26},
  doi          = {10.1007/11908739\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ParkCLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ParkLKLK06,
  author       = {Yongsu Park and
                  Younho Lee and
                  Heeyoul Kim and
                  Gil{-}Joo Lee and
                  Il{-}Hee Kim},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Hardware Stack Design: Towards an Effective Defence Against Frame
                  Pointer Overwrite Attacks},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {268--277},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_19},
  doi          = {10.1007/11908739\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ParkLKLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakakiYO06,
  author       = {Hiroshi Sakaki and
                  Kazuo Yanoo and
                  Ryuichi Ogawa},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Model-Based Method for Security Configuration Verification},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_5},
  doi          = {10.1007/11908739\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakakiYO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Savola06,
  author       = {Reijo Savola},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Requirement Centric Framework for Information Security Evaluation},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {48--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_4},
  doi          = {10.1007/11908739\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Savola06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShiYZ06,
  author       = {Yi Shi and
                  Xinyu Yang and
                  Huijun Zhu},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement
                  and Prediction},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_18},
  doi          = {10.1007/11908739\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShiYZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Tan06,
  author       = {Chik How Tan},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Chosen Ciphertext Security from Identity-Based Encryption Without
                  \emph{Strong} Condition},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_21},
  doi          = {10.1007/11908739\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Tan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TartaryW06,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Rateless Codes for the Multicast Stream Authentication Problem},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_10},
  doi          = {10.1007/11908739\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TartaryW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TrabelsiEFR06,
  author       = {Zouheir Trabelsi and
                  Hesham El{-}Sayed and
                  Lilia Frikha and
                  Tamer Rabie},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Traceroute Based {IP} Channel for Sending Hidden Short Messages},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_30},
  doi          = {10.1007/11908739\_30},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/TrabelsiEFR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TunstallMM06,
  author       = {Michael Tunstall and
                  Constantinos Markantonakis and
                  Keith Mayes},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Inhibiting Card Sharing Attacks},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {239--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_17},
  doi          = {10.1007/11908739\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/TunstallMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WuSMZ06,
  author       = {Qianhong Wu and
                  Willy Susilo and
                  Yi Mu and
                  Fangguo Zhang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Ad Hoc Group Signatures},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_9},
  doi          = {10.1007/11908739\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/WuSMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangPS06,
  author       = {Xinwen Zhang and
                  Francesco Parisi{-}Presicce and
                  Ravi S. Sandhu},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Towards Remote Policy Enforcement for Runtime Protection of Mobile
                  Code Using Trusted Computing},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_13},
  doi          = {10.1007/11908739\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2006,
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739},
  doi          = {10.1007/11908739},
  isbn         = {3-540-47699-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}