default search action
Search dblp for Publications
export results for "stream:conf/iwsec:"
@inproceedings{DBLP:conf/iwsec/AlavizadehJAA24, author = {Hooman Alavizadeh and Julian Jang{-}Jaccard and Hootan Alavizadeh and Tansu Alpcan}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {244--254}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_14}, doi = {10.1007/978-981-97-7737-2\_14}, timestamp = {Sun, 29 Sep 2024 21:17:19 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlavizadehJAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BelelD24, author = {Anushree Belel and Ratna Dutta}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {101--121}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_6}, doi = {10.1007/978-981-97-7737-2\_6}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BelelD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BilleT24, author = {Alexander Bille and Elmar Tischhauser}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {23--42}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_2}, doi = {10.1007/978-981-97-7737-2\_2}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BilleT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BilotMAZ24, author = {Tristan Bilot and Nour El Madhoun and Khaldoun Al Agha and Anis Zouaoui}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {257--276}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_15}, doi = {10.1007/978-981-97-7737-2\_15}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BilotMAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FairozeD24, author = {Jaiden Fairoze and Peitong Duan}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Information Leakage Through Packet Lengths in {RTC} Traffic}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {277--296}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_16}, doi = {10.1007/978-981-97-7737-2\_16}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FairozeD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HondaS24, author = {Yoshiaki Honda and Kazumasa Shinagawa}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {85--100}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_5}, doi = {10.1007/978-981-97-7737-2\_5}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HondaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Hwang24, author = {Vincent Hwang}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Formal Verification of Emulated Floating-Point Arithmetic in Falcon}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {125--141}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_7}, doi = {10.1007/978-981-97-7737-2\_7}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Hwang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/List24, author = {Eik List}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {45--64}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_3}, doi = {10.1007/978-981-97-7737-2\_3}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/List24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MahboubiCAPMDP24, author = {Arash Mahboubi and Seyit Camtepe and Keyvan Ansari and Marcin Piotr Pawlowski and Pawel Morawiecki and Jaroslaw Duda and Josef Pieprzyk}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {File System Shield {(FSS):} {A} Pass-Through Strategy Against Unwanted Encryption in Network File Systems}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {213--233}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_12}, doi = {10.1007/978-981-97-7737-2\_12}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MahboubiCAPMDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MiyachiNS24, author = {Rin Miyachi and Konan Nagashima and Taiichi Saito}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Race Condition Vulnerabilities in WordPress Plug-ins}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {179--194}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_10}, doi = {10.1007/978-981-97-7737-2\_10}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MiyachiNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OkajimaC24, author = {Kabuto Okajima and Koji Chida}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {A Study on Anonymization Through Participation in iPWS Cup 2023}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {297--306}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_17}, doi = {10.1007/978-981-97-7737-2\_17}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OkajimaC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoAKY24, author = {Arata Sato and Aur{\'{e}}lien Auzemery and Akira Katayama and Masaya Yasuda}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Experimental Analysis of Integer Factorization Methods Using Lattices}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {142--157}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_8}, doi = {10.1007/978-981-97-7737-2\_8}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoAKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShirayaSI24, author = {Takuro Shiraya and Kosei Sakamoto and Takanori Isobe}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Bit-Wise Analysis for Forgery Attacks on AES-Based {AEAD} Schemes}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {3--22}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_1}, doi = {10.1007/978-981-97-7737-2\_1}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShirayaSI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/StabiliBVM24, author = {Dario Stabili and Tobia Bocchi and Filip Valgimigli and Mirco Marchetti}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Finding (and Exploiting) Vulnerabilities on {IP} Cameras: The Tenda {CP3} Case Study}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {195--210}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_11}, doi = {10.1007/978-981-97-7737-2\_11}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/StabiliBVM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SugioI24, author = {Nobuyuki Sugio and Hokuto Ito}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Implementation for Malicious Software Using ChatGPT-4}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {234--243}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_13}, doi = {10.1007/978-981-97-7737-2\_13}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SugioI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TagaIO24, author = {Bungo Taga and Norimitsu Ito and Takako Okano}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Weak Keys of the Full {MISTY1} Recovered in Practical Time}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {65--81}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_4}, doi = {10.1007/978-981-97-7737-2\_4}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TagaIO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoshiguchiAT24, author = {Naoki Yoshiguchi and Yusuke Aikawa and Tsuyoshi Takagi}, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Sieving Method for {SDP} with the Zero Window: An Improvement in Low Memory Environments}, booktitle = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, pages = {158--176}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2\_9}, doi = {10.1007/978-981-97-7737-2\_9}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoshiguchiAT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2024, editor = {Kazuhiko Minematsu and Mamoru Mimura}, title = {Advances in Information and Computer Security - 19th International Workshop on Security, {IWSEC} 2024, Kyoto, Japan, September 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14977}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-7737-2}, doi = {10.1007/978-981-97-7737-2}, isbn = {978-981-97-7736-5}, timestamp = {Sun, 29 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AmbronaBST23, author = {Miguel Ambrona and Marc Beunardeau and Anne{-}Laure Schmitt and Raphael R. Toledo}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {a\emph{P}lon\emph{K}: Aggregated \emph{P}lon\emph{K} from Multi-polynomial Commitment Schemes}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {195--213}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_11}, doi = {10.1007/978-3-031-41326-1\_11}, timestamp = {Fri, 25 Aug 2023 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AmbronaBST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23, author = {Julien B{\'{e}}guinot and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul and Ville Yli{-}M{\"{a}}yry}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Reliability of Ring Oscillator PUFs with Reduced Helper Data}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {36--56}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_3}, doi = {10.1007/978-3-031-41326-1\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CartorCLS23, author = {Max Cartor and Ryann Cartor and Mark Lewis and Daniel Smith{-}Tone}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {137--151}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_8}, doi = {10.1007/978-3-031-41326-1\_8}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CartorCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FurueI23, author = {Hiroki Furue and Yasuhiko Ikematsu}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {A New Security Analysis Against {MAYO} and {QR-UOV} Using Rectangular MinRank Attack}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {101--116}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_6}, doi = {10.1007/978-3-031-41326-1\_6}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FurueI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FuruyaKIMI23, author = {Isamu Furuya and Hayato Kasahara and Akiko Inoue and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {PMACrx: {A} Vector-Input {MAC} for High-Dimensional Vectors with {BBB} Security}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {77--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_5}, doi = {10.1007/978-3-031-41326-1\_5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FuruyaKIMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/GiraudN23, author = {Vincent Giraud and David Naccache}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {3--15}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_1}, doi = {10.1007/978-3-031-41326-1\_1}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/GiraudN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HandKLMR23, author = {Samuel D. Hand and Alexander Koch and Pascal Lafourcade and Daiki Miyahara and L{\'{e}}o Robert}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Check Alternating Patterns: {A} Physical Zero-Knowledge Proof for Moon-or-Sun}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {255--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_14}, doi = {10.1007/978-3-031-41326-1\_14}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HandKLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LeeS23, author = {Hyeonbum Lee and Jae Hong Seo}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {{TENET:} Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {214--234}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_12}, doi = {10.1007/978-3-031-41326-1\_12}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LeeS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MarcoTV23, author = {Laurane Marco and Abdullah Talayhan and Serge Vaudenay}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {173--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_10}, doi = {10.1007/978-3-031-41326-1\_10}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MarcoTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Nuida23, author = {Koji Nuida}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {237--254}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_13}, doi = {10.1007/978-3-031-41326-1\_13}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Nuida23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/RemigioBPCZ23, author = {Riccardo Remigio and Alessandro Bertani and Mario Polino and Michele Carminati and Stefano Zanero}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {16--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_2}, doi = {10.1007/978-3-031-41326-1\_2}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/RemigioBPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TranV23, author = {B{\'{e}}n{\'{e}}dikt Tran and Serge Vaudenay}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Extractable Witness Encryption for the Homogeneous Linear Equations Problem}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {152--172}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_9}, doi = {10.1007/978-3-031-41326-1\_9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TranV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhaoZYSH23, author = {Jiahao Zhao and Nana Zhang and Qianqian Yang and Ling Song and Lei Hu}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Boomerang Attacks on Deoxys-BC}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {59--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_4}, doi = {10.1007/978-3-031-41326-1\_4}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhaoZYSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhuKKT23, author = {Haiming Zhu and Shoichi Kamada and Momonari Kudo and Tsuyoshi Takagi}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {117--136}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_7}, doi = {10.1007/978-3-031-41326-1\_7}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhuKKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2023, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1}, doi = {10.1007/978-3-031-41326-1}, isbn = {978-3-031-41325-4}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeckerHKPY22, author = {Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Lorenz Panny and Bo{-}Yin Yang}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {3--23}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_1}, doi = {10.1007/978-3-031-15255-9\_1}, timestamp = {Thu, 18 Aug 2022 14:32:38 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeckerHKPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DaizaY22, author = {Takanori Daiza and Kazuki Yoneyama}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {128--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_7}, doi = {10.1007/978-3-031-15255-9\_7}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DaizaY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FujiiKSY22, author = {Shota Fujii and Nobutaka Kawaguchi and Tomohiro Shigemoto and Toshihiro Yamauchi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {CyNER: Information Extraction from Unstructured Text of {CTI} Sources with Noncontextual IOCs}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {85--104}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_5}, doi = {10.1007/978-3-031-15255-9\_5}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FujiiKSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HagaTSMSHM22, author = {Rikuo Haga and Kodai Toyoda and Yuto Shinoda and Daiki Miyahara and Kazumasa Shinagawa and Yu{-}ichi Hayashi and Takaaki Mizuki}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Card-Based Secure Sorting Protocol}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {224--240}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_12}, doi = {10.1007/978-3-031-15255-9\_12}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HagaTSMSHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HeseriN22, author = {Nariyasu Heseri and Koji Nuida}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in {MPC} Protocols}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {208--223}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_11}, doi = {10.1007/978-3-031-15255-9\_11}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HeseriN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KatoKT22, author = {Taku Kato and Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {147--165}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_8}, doi = {10.1007/978-3-031-15255-9\_8}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KatoKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY22, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {{KDPM:} Kernel Data Protection Mechanism Using a Memory Protection Key}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {66--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_4}, doi = {10.1007/978-3-031-15255-9\_4}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PersichettiR22, author = {Edoardo Persichetti and Tovohery Randrianarisoa}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {24--44}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_2}, doi = {10.1007/978-3-031-15255-9\_2}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PersichettiR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShenLS22, author = {Sihao Shen and Zhenzhen Li and Wei Song}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Methods of Extracting Parameters of the Processor Caches}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {47--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_3}, doi = {10.1007/978-3-031-15255-9\_3}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShenLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinokiN22, author = {Hirotomo Shinoki and Koji Nuida}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {189--207}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_10}, doi = {10.1007/978-3-031-15255-9\_10}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShinokiN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SibleyrasSTHY22, author = {Ferdinand Sibleyras and Yu Sasaki and Yosuke Todo and Akinori Hosoyamada and Kan Yasuda}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {107--127}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_6}, doi = {10.1007/978-3-031-15255-9\_6}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SibleyrasSTHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YouLTTM22, author = {Jing{-}Shiuan You and Zi{-}Yuan Liu and Raylin Tso and Yi{-}Fan Tseng and Masahiro Mambo}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {166--186}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_9}, doi = {10.1007/978-3-031-15255-9\_9}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YouLTTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2022, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9}, doi = {10.1007/978-3-031-15255-9}, isbn = {978-3-031-15254-2}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BoothXKS21, author = {Roland Booth and Yanhong Xu and Sabyasachi Karati and Reihaneh Safavi{-}Naini}, editor = {Toru Nakanishi and Ryo Nojima}, title = {An Intermediate Secret-Guessing Attack on Hash-Based Signatures}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {195--215}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_11}, doi = {10.1007/978-3-030-85987-9\_11}, timestamp = {Fri, 03 Sep 2021 14:25:23 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BoothXKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DaizaK21, author = {Takanori Daiza and Kaoru Kurosawa}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Optimum Attack on 3-Round Feistel-2 Structure}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {175--192}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_10}, doi = {10.1007/978-3-030-85987-9\_10}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DaizaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FanSOCAM21, author = {Yun Fan and Toshiki Shibahara and Yuichi Ohsita and Daiki Chiba and Mitsuaki Akiyama and Masayuki Murata}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {99--118}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_6}, doi = {10.1007/978-3-030-85987-9\_6}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/FanSOCAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HamasakiH21, author = {Koji Hamasaki and Hitoshi Hohjo}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Moving Target Defense for the CloudControl Game}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {241--251}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_14}, doi = {10.1007/978-3-030-85987-9\_14}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HamasakiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Hashimoto21, author = {Yasufumi Hashimoto}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {137--150}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_8}, doi = {10.1007/978-3-030-85987-9\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Hashimoto21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IkematsuNY21, author = {Yasuhiko Ikematsu and Satoshi Nakamura and Masaya Yasuda}, editor = {Toru Nakanishi and Ryo Nojima}, title = {A Trace Map Attack Against Special Ring-LWE Samples}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {3--22}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_1}, doi = {10.1007/978-3-030-85987-9\_1}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/IkematsuNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY21, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {{KPRM:} Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {45--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_3}, doi = {10.1007/978-3-030-85987-9\_3}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LeGrowH21, author = {Jason T. LeGrow and Aaron Hutchinson}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral {CSIDH}}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {216--226}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_12}, doi = {10.1007/978-3-030-85987-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LeGrowH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MasudaK21, author = {Masahiro Masuda and Yukiyoshi Kameyama}, editor = {Toru Nakanishi and Ryo Nojima}, title = {{FFT} Program Generation for Ring LWE-Based Cryptography}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {151--171}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_9}, doi = {10.1007/978-3-030-85987-9\_9}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MasudaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21, author = {Toru Nakamura and Hiroshi Ito and Shinsaku Kiyomoto and Toshihiro Yamauchi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {64--73}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_4}, doi = {10.1007/978-3-030-85987-9\_4}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PhalakarnSAM21, author = {Kittiphop Phalakarn and Vorapong Suppakitpaisarn and Nuttapong Attrapadung and Kanta Matsuura}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Evolving Homomorphic Secret Sharing for Hierarchical Access Structures}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {77--96}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_5}, doi = {10.1007/978-3-030-85987-9\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PhalakarnSAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21, author = {Shusaku Uemura and Kazuhide Fukushima and Shinsaku Kiyomoto and Momonari Kudo and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the {LWR} Problem}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {23--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_2}, doi = {10.1007/978-3-030-85987-9\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YamabaSUAMPO21, author = {Hisaaki Yamaba and Ahmad Saiful Aqmal Bin Ahmad Sohaimi and Shotaro Usuzaki and Kentaro Aburada and Masayuki Mukunoki and Mirang Park and Naonobu Okazaki}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Proposal of Jawi {CAPTCHA} Using Digraphia Feature of the Malay Language}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {119--133}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_7}, doi = {10.1007/978-3-030-85987-9\_7}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YamabaSUAMPO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YinWT21, author = {Changze Yin and Yacheng Wang and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Simple Matrix Signature Scheme}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {227--237}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_13}, doi = {10.1007/978-3-030-85987-9\_13}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YinWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2021, editor = {Toru Nakanishi and Ryo Nojima}, title = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9}, doi = {10.1007/978-3-030-85987-9}, isbn = {978-3-030-85986-2}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BaninD20, author = {Sergii Banin and Geir Olav Dyrkolbotn}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Detection of Running Malware Before it Becomes Malicious}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {57--73}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_4}, doi = {10.1007/978-3-030-58208-1\_4}, timestamp = {Thu, 27 Aug 2020 12:11:44 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BaninD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DanST20, author = {Yuichiro Dan and Toshiki Shibahara and Junko Takahashi}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Timing Attack on Random Forests for Generating Adversarial Examples}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {285--302}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_16}, doi = {10.1007/978-3-030-58208-1\_16}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DanST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FehrV20, author = {Serge Fehr and Serge Vaudenay}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Sublinear Bounds on the Distinguishing Advantage for Multiple Samples}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {165--183}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_10}, doi = {10.1007/978-3-030-58208-1\_10}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FehrV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FukuokaYT20, author = {Takeru Fukuoka and Yuji Yamaoka and Takeaki Terada}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Model Extraction Oriented Data Publishing with k-anonymity}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {218--236}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_13}, doi = {10.1007/978-3-030-58208-1\_13}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FukuokaYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KinoshitaS20, author = {Kai Kinoshita and Koutarou Suzuki}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {261--281}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_15}, doi = {10.1007/978-3-030-58208-1\_15}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KinoshitaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KoderaTKNU20, author = {Yuta Kodera and Yuki Taketa and Takuya Kusaka and Yasuyuki Nogami and Satoshi Uehara}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {23--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_2}, doi = {10.1007/978-3-030-58208-1\_2}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KoderaTKNU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Kurek20, author = {Rafael Kurek}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Efficient Forward-Secure Threshold Signatures}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {239--260}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_14}, doi = {10.1007/978-3-030-58208-1\_14}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Kurek20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY20, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {{MKM:} Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {97--116}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_6}, doi = {10.1007/978-3-030-58208-1\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Matsuda20, author = {Yoshitatsu Matsuda}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Optimization of Search Space for Finding Very Short Lattice Vectors}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {149--161}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_9}, doi = {10.1007/978-3-030-58208-1\_9}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Matsuda20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiT20, author = {Hiroshi Onuki and Tsuyoshi Takagi}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {On Collisions Related to an Ideal Class of Order 3 in {CSIDH}}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {131--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_8}, doi = {10.1007/978-3-030-58208-1\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SarkarSS20, author = {Sumanta Sarkar and Yu Sasaki and Siang Meng Sim}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {3--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_1}, doi = {10.1007/978-3-030-58208-1\_1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SarkarSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SasakiN20, author = {Kota Sasaki and Koji Nuida}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {77--94}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_5}, doi = {10.1007/978-3-030-58208-1\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SasakiN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SugawaraO020, author = {Takeshi Sugawara and Tatsuya Onuma and Yang Li}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {117--127}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_7}, doi = {10.1007/978-3-030-58208-1\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SugawaraO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TajiriM20, author = {Yui Tajiri and Mamoru Mimura}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Detection of Malicious PowerShell Using Word-Level Language Models}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {39--56}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_3}, doi = {10.1007/978-3-030-58208-1\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TajiriM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WasedaN20, author = {Atsushi Waseda and Ryo Nojima}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {On Limitation of Plausible Deniability}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {207--217}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_12}, doi = {10.1007/978-3-030-58208-1\_12}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WasedaN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YanV20, author = {Hailun Yan and Serge Vaudenay}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Symmetric Asynchronous Ratcheted Communication with Associated Data}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {184--204}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_11}, doi = {10.1007/978-3-030-58208-1\_11}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YanV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2020, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1}, doi = {10.1007/978-3-030-58208-1}, isbn = {978-3-030-58207-4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BanikFI19, author = {Subhadeep Banik and Yuki Funabiki and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {More Results on Shortest Linear Programs}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {109--128}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_7}, doi = {10.1007/978-3-030-26834-3\_7}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BanikFI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BaninD19, author = {Sergii Banin and Geir Olav Dyrkolbotn}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {149--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_9}, doi = {10.1007/978-3-030-26834-3\_9}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BaninD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasFLLT19, author = {Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {A New Approach to Constructing Digital Signature Schemes - (Short Paper)}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {363--373}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_21}, doi = {10.1007/978-3-030-26834-3\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasFLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DesmedtM19, author = {Yvo Desmedt and Kirill Morozov}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{VSS} Made Simpler}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {329--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_19}, doi = {10.1007/978-3-030-26834-3\_19}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Dumas0FLOPP19, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Julio L{\'{o}}pez Fenner and David Lucas and Jean{-}Baptiste Orfila and Cl{\'{e}}ment Pernet and Maxime Puys}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {67--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_5}, doi = {10.1007/978-3-030-26834-3\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/Dumas0FLOPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DurakV19, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {343--362}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_20}, doi = {10.1007/978-3-030-26834-3\_20}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DurakV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HayataK0HM19, author = {Junichiro Hayata and Fuyuki Kitagawa and Yusuke Sakai and Goichiro Hanaoka and Kanta Matsuura}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Equivalence Between Non-malleability Against Replayable {CCA} and Other RCCA-Security Notions}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {253--272}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_15}, doi = {10.1007/978-3-030-26834-3\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HayataK0HM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HirutaIST19, author = {Shohei Hiruta and Satoshi Ikeda and Shigeyoshi Shima and Hiroki Takakura}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{IDS} Alert Priority Determination Based on Traffic Behavior}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {189--206}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_11}, doi = {10.1007/978-3-030-26834-3\_11}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HirutaIST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ItoSU19, author = {Takuma Ito and Naoyuki Shinohara and Shigenori Uchiyama}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {An Efficient F{\_}4 -style Based Algorithm to Solve {MQ} Problems}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {37--52}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_3}, doi = {10.1007/978-3-030-26834-3\_3}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ItoSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KoayWS19, author = {Abigail M. Y. Koay and Ian Welch and Winston K. G. Seah}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {207--217}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_12}, doi = {10.1007/978-3-030-26834-3\_12}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KoayWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19, author = {Kaoru Kurosawa and Akinaga Ueda and Hayato Matsuhashi and Yusuke Sakagami}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {53--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_4}, doi = {10.1007/978-3-030-26834-3\_4}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuCW19, author = {Fukang Liu and Zhenfu Cao and Gaoli Wang}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {287--305}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_17}, doi = {10.1007/978-3-030-26834-3\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuI19, author = {Fukang Liu and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {306--326}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_18}, doi = {10.1007/978-3-030-26834-3\_18}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/LiuI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MantasP19, author = {Evangelos Mantas and Constantinos Patsakis}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{GRYPHON:} Drone Forensics in Dataflash and Telemetry Logs}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {377--390}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_22}, doi = {10.1007/978-3-030-26834-3\_22}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MantasP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MimuraO19, author = {Mamoru Mimura and Taro Ohminami}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Towards Efficient Detection of Malicious {VBA} Macros with {LSI}}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {168--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_10}, doi = {10.1007/978-3-030-26834-3\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/MimuraO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OkishimaN19, author = {Ryo Okishima and Toru Nakanishi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {An Anonymous Credential System with Constant-Size Attribute Proofs for {CNF} Formulas with Negations}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {89--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_6}, doi = {10.1007/978-3-030-26834-3\_6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OkishimaN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiAYT19, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping Two Points}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {23--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_2}, doi = {10.1007/978-3-030-26834-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OtsukiKIMFL19, author = {Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Jun Miyoshi and Jacob Faires and Terrence Lillard}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Toward the Analysis of Distributed Code Injection in Post-mortem Forensics}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {391--409}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_23}, doi = {10.1007/978-3-030-26834-3\_23}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OtsukiKIMFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Yuki Funabiki and Andrey Bogdanov and Sumio Morioka and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized Feistel Structure}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {129--145}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_8}, doi = {10.1007/978-3-030-26834-3\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoIOY19, author = {Masaya Sato and Yuta Imamura and Rintaro Orito and Toshihiro Yamauchi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) Method for Preventing Suspicious Web Access in Android WebView}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {241--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_14}, doi = {10.1007/978-3-030-26834-3\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TomitaOK19, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not {\textbackslash}mathtt q -type) Assumptions}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {3--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_1}, doi = {10.1007/978-3-030-26834-3\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangLX19, author = {Xin Wang and Shimin Li and Rui Xue}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {273--283}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_16}, doi = {10.1007/978-3-030-26834-3\_16}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/WangLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZeierWH19, author = {Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{API} Usability of Stateful Signature Schemes}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {221--240}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_13}, doi = {10.1007/978-3-030-26834-3\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZeierWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2019, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3}, doi = {10.1007/978-3-030-26834-3}, isbn = {978-3-030-26833-6}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/0002TG18, author = {Chen Qian and Mehdi Tibouchi and R{\'{e}}mi G{\'{e}}raud}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Universal Witness Signatures}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {313--329}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_20}, doi = {10.1007/978-3-319-97916-8\_20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/0002TG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Aoki18, author = {Kazumaro Aoki}, editor = {Atsuo Inomata and Kan Yasuda}, title = {(Short Paper) Parameter Trade-Offs for {NFS} and {ECM}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {114--123}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_8}, doi = {10.1007/978-3-319-97916-8\_8}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Aoki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BertR18, author = {Pauline Bert and Adeline Roux{-}Langlois}, editor = {Atsuo Inomata and Kan Yasuda}, title = {From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the {BLISS} Signature}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {297--312}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_19}, doi = {10.1007/978-3-319-97916-8\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BertR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CianciulloG18, author = {Louis Cianciullo and Hossein Ghodosi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Improvements to Almost Optimum Secret Sharing with Cheating Detection}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {193--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_13}, doi = {10.1007/978-3-319-97916-8\_13}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CianciulloG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HashimotoIT18, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt 2017}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_1}, doi = {10.1007/978-3-319-97916-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HashimotoIT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IguchiUF18, author = {Makoto Iguchi and Taro Uematsu and Tatsuro Fujii}, editor = {Atsuo Inomata and Kan Yasuda}, title = {The Anatomy of the {HIPAA} Privacy Rule: {A} Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {174--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_12}, doi = {10.1007/978-3-319-97916-8\_12}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IguchiUF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ItoHYS18, author = {Katsutaka Ito and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Detecting Privacy Information Abuse by Android Apps from {API} Call Logs}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {143--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_10}, doi = {10.1007/978-3-319-97916-8\_10}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ItoHYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LaanPRRSV18, author = {Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Is Java Card Ready for Hash-Based Signatures?}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {127--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_9}, doi = {10.1007/978-3-319-97916-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LaanPRRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LauT18, author = {Terry Shue Chien Lau and Chik How Tan}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {19--34}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_2}, doi = {10.1007/978-3-319-97916-8\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LauT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiWL18, author = {Qiuping Li and Baofeng Wu and Zhuojun Liu}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Lightweight Recursive {MDS} Matrices with Generalized Feistel Network}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {262--278}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_17}, doi = {10.1007/978-3-319-97916-8\_17}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnozawaKYN18, author = {Sota Onozawa and Noboru Kunihiro and Masayuki Yoshino and Ken Naganuma}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {35--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_3}, doi = {10.1007/978-3-319-97916-8\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnozawaKYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SaitoYSS18, author = {Takamichi Saito and Masahiro Yokoyama and Shota Sugawara and Kuniyasu Suzaki}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {68--83}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_5}, doi = {10.1007/978-3-319-97916-8\_5}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SaitoYSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sasaki18, author = {Yu Sasaki}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to {GIFT}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {227--243}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_15}, doi = {10.1007/978-3-319-97916-8\_15}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sasaki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShiY18, author = {Cheng Shi and Kazuki Yoneyama}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Verification of {LINE} Encryption Version 1.0 Using ProVerif}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {158--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_11}, doi = {10.1007/978-3-319-97916-8\_11}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShimaD18, author = {Koji Shima and Hiroshi Doi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {XOR-Based Hierarchical Secret Sharing Scheme}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {206--223}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_14}, doi = {10.1007/978-3-319-97916-8\_14}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShimaD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TadaUK18, author = {Hayato Tada and Akinaga Ueda and Kaoru Kurosawa}, editor = {Atsuo Inomata and Kan Yasuda}, title = {How to Prove {KDM} Security of {BHHO}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {281--296}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_18}, doi = {10.1007/978-3-319-97916-8\_18}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TadaUK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UedaTK18, author = {Akinaga Ueda and Hayato Tada and Kaoru Kurosawa}, editor = {Atsuo Inomata and Kan Yasuda}, title = {(Short Paper) How to Solve {DLOG} Problem with Auxiliary Input}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {104--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_7}, doi = {10.1007/978-3-319-97916-8\_7}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UedaTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangWTT18, author = {Weiyao Wang and Yuntao Wang and Atsushi Takayasu and Tsuyoshi Takagi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {87--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_6}, doi = {10.1007/978-3-319-97916-8\_6}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangWTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WiemersK18, author = {Andreas Wiemers and Dominik Klein}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {51--67}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_4}, doi = {10.1007/978-3-319-97916-8\_4}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WiemersK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangLLW18, author = {Jingchun Yang and Meicheng Liu and Dongdai Lin and Wenhao Wang}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Symbolic-Like Computation and Conditional Differential Cryptanalysis of {QUARK}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {244--261}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_16}, doi = {10.1007/978-3-319-97916-8\_16}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YangLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2018, editor = {Atsuo Inomata and Kan Yasuda}, title = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8}, doi = {10.1007/978-3-319-97916-8}, isbn = {978-3-319-97915-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Al-FannahL17, author = {Nasser Mohammed Al{-}Fannah and Wanpeng Li}, editor = {Satoshi Obana and Koji Chida}, title = {Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {105--120}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_7}, doi = {10.1007/978-3-319-64200-0\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Al-FannahL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17, author = {Saed Alsayigh and Jintai Ding and Tsuyoshi Takagi and Yuntao Wang}, editor = {Satoshi Obana and Koji Chida}, title = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {19--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_2}, doi = {10.1007/978-3-319-64200-0\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasLWC17, author = {Ahto Buldas and Aleksandr Lenin and Jan Willemson and Anton Charnamord}, editor = {Satoshi Obana and Koji Chida}, title = {Simple Infeasibility Certificates for Attack Trees}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {39--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_3}, doi = {10.1007/978-3-319-64200-0\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Fujioka17, author = {Atsushi Fujioka}, editor = {Satoshi Obana and Koji Chida}, title = {Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {192--211}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_12}, doi = {10.1007/978-3-319-64200-0\_12}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Fujioka17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HosoyamadaA17, author = {Akinori Hosoyamada and Kazumaro Aoki}, editor = {Satoshi Obana and Koji Chida}, title = {On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_1}, doi = {10.1007/978-3-319-64200-0\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HosoyamadaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KondoSTI17, author = {Kota Kondo and Yu Sasaki and Yosuke Todo and Tetsu Iwata}, editor = {Satoshi Obana and Koji Chida}, title = {Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {141--158}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_9}, doi = {10.1007/978-3-319-64200-0\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KondoSTI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuchtaSSBM17, author = {Veronika Kuchta and Gaurav Sharma and Rajeev Anand Sahu and Tarunpreet Bhatia and Olivier Markowitch}, editor = {Satoshi Obana and Koji Chida}, title = {Secure Certificateless Proxy Re-encryption Without Pairing}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {85--101}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_6}, doi = {10.1007/978-3-319-64200-0\_6}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuchtaSSBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MauN17, author = {Baptiste Vinh Mau and Koji Nuida}, editor = {Satoshi Obana and Koji Chida}, title = {Correction of a Secure Comparison Protocol for Encrypted Integers in {IEEE} {WIFS} 2012 (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {181--191}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_11}, doi = {10.1007/978-3-319-64200-0\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MauN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuVS17, author = {Jiawei Su and Danilo Vasconcellos Vargas and Kouichi Sakurai}, editor = {Satoshi Obana and Koji Chida}, title = {Evasion Attacks Against Statistical Code Obfuscation Detectors}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {121--137}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_8}, doi = {10.1007/978-3-319-64200-0\_8}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XiaJY17, author = {Bingqing Xia and Dongyao Ji and Gang Yao}, editor = {Satoshi Obana and Koji Chida}, title = {Enhanced {TLS} Handshake Authentication with Blockchain and Smart Contract (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {56--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_4}, doi = {10.1007/978-3-319-64200-0\_4}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XiaJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMBRK17, author = {Rui Xu and Kirill Morozov and Anirban Basu and Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, editor = {Satoshi Obana and Koji Chida}, title = {Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {159--178}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_10}, doi = {10.1007/978-3-319-64200-0\_10}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XueLL17, author = {Haiyang Xue and Bao Li and Xianhui Lu}, editor = {Satoshi Obana and Koji Chida}, title = {{IND-PCA} Secure {KEM} Is Enough for Password-Based Authenticated Key Exchange (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {231--241}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_14}, doi = {10.1007/978-3-319-64200-0\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XueLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangFLW17, author = {Daode Zhang and Fuyang Fang and Bao Li and Xin Wang}, editor = {Satoshi Obana and Koji Chida}, title = {Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {215--230}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_13}, doi = {10.1007/978-3-319-64200-0\_13}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangFLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangH17, author = {Rui Zhang and Kai He}, editor = {Satoshi Obana and Koji Chida}, title = {Multipurpose Public-Key Encryption}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {69--84}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_5}, doi = {10.1007/978-3-319-64200-0\_5}, timestamp = {Sat, 19 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2017, editor = {Satoshi Obana and Koji Chida}, title = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0}, doi = {10.1007/978-3-319-64200-0}, isbn = {978-3-319-64199-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AguessyBBCD16, author = {Fran{\c{c}}ois{-}Xavier Aguessy and Olivier Bettan and Gregory Blanc and Vania Conan and Herv{\'{e}} Debar}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Hybrid Risk Assessment Model Based on Bayesian Networks}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {21--40}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_2}, doi = {10.1007/978-3-319-44524-3\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BarenghiP16, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {A Note on Fault Attacks Against Deterministic Signature Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {182--192}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_11}, doi = {10.1007/978-3-319-44524-3\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeatoHM16, author = {Filipe Beato and Kimmo Halunen and Bart Mennink}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Recipient Privacy in Online Social Networks}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {254--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_15}, doi = {10.1007/978-3-319-44524-3\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeatoHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ButinDB16, author = {Denis Butin and Denise Demirel and Johannes Buchmann}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Formal Policy-Based Provenance Audit}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {234--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_14}, doi = {10.1007/978-3-319-44524-3\_14}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ButinDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DingKOTT16, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {305--315}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_18}, doi = {10.1007/978-3-319-44524-3\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16, author = {Takato Hirano and Mitsuhiro Hattori and Yutaka Kawai and Nori Matsuda and Mitsugu Iwamoto and Kazuo Ohta and Yusuke Sakai and Tatsuji Munaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {91--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_6}, doi = {10.1007/978-3-319-44524-3\_6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JeongKPN16, author = {Ji{-}Hoon Jeong and Hyung Chan Kim and Il Hwan Park and Bong{-}Nam Noh}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Hooking Graceful Moments: {A} Security Analysis of Sudo Session Handling}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {41--60}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_3}, doi = {10.1007/978-3-319-44524-3\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JeongKPN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KawachiTT16, author = {Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {195--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_12}, doi = {10.1007/978-3-319-44524-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KudoYGY16, author = {Momonari Kudo and Junpei Yamaguchi and Yang Guo and Masaya Yasuda}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Practical Analysis of Key Recovery Attack Against Search-LWE Problem}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {164--181}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_10}, doi = {10.1007/978-3-319-44524-3\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KudoYGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16, author = {Kaoru Kurosawa and Keisuke Sasaki and Kiyohiko Ohta and Kazuki Yoneyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {73--90}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_5}, doi = {10.1007/978-3-319-44524-3\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LinWJZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Shengzhi Zhang and Chuankun Wu}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_1}, doi = {10.1007/978-3-319-44524-3\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/LinWJZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiTKU16, author = {Hiroshi Onuki and Tadanori Teruya and Naoki Kanayama and Shigenori Uchiyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {319--334}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_19}, doi = {10.1007/978-3-319-44524-3\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiTKU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XiangZL16, author = {Zejun Xiang and Wentao Zhang and Dongdai Lin}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {On the Division Property of Simon48 and Simon64}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {147--163}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_9}, doi = {10.1007/978-3-319-44524-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XieTCZG16, author = {Wei Xie and Yong Tang and Shuhui Chen and Yi Zhang and Yuanming Gao}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Security of Web of Things: {A} Survey}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {61--70}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_4}, doi = {10.1007/978-3-319-44524-3\_4}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XieTCZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yamamoto16, author = {Hiroaki Yamamoto}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Secure Automata-Based Substring Search Scheme on Encrypted Data}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {111--131}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_7}, doi = {10.1007/978-3-319-44524-3\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yamamoto16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Related-Key Impossible Differential Analysis of Full Khudra}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {135--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_8}, doi = {10.1007/978-3-319-44524-3\_8}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YashiroMIS16, author = {Risa Yashiro and Takanori Machida and Mitsugu Iwamoto and Kazuo Sakiyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter {PUF} and Its Variants}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {267--285}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_16}, doi = {10.1007/978-3-319-44524-3\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangCZL16, author = {Tao Zhang and Sherman S. M. Chow and Zhe Zhou and Ming Li}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {215--233}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_13}, doi = {10.1007/978-3-319-44524-3\_13}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangCZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangT16, author = {Wenbin Zhang and Chik How Tan}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {On the Security and Key Generation of the {ZHFE} Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {289--304}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_17}, doi = {10.1007/978-3-319-44524-3\_17}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2016, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3}, doi = {10.1007/978-3-319-44524-3}, isbn = {978-3-319-44523-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EzakiDI15, author = {Takaya Ezaki and Tomohiro Date and Hiroyuki Inoue}, editor = {Keisuke Tanaka and Yuji Suga}, title = {An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {301--315}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_18}, doi = {10.1007/978-3-319-22425-1\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EzakiDI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FangLLS15, author = {Fuyang Fang and Bao Li and Xianhui Lu and Xiaochao Sun}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improved Efficiency of {MP12}}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {193--210}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_12}, doi = {10.1007/978-3-319-22425-1\_12}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FangLLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HeLLJXS15, author = {Jingnan He and Bao Li and Xianhui Lu and Dingding Jia and Haiyang Xue and Xiaochao Sun}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Identity-Based Lossy Encryption from Learning with Errors}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_1}, doi = {10.1007/978-3-319-22425-1\_1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HeLLJXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HoshinoO15, author = {Hidetaka Hoshino and Satoshi Obana}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {213--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_13}, doi = {10.1007/978-3-319-22425-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IkarashiKCT15, author = {Dai Ikarashi and Ryo Kikuchi and Koji Chida and Katsumi Takahashi}, editor = {Keisuke Tanaka and Yuji Suga}, title = {k-Anonymous Microdata Release via Post Randomisation Method}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_14}, doi = {10.1007/978-3-319-22425-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IkarashiKCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KimT15, author = {Taechan Kim and Mehdi Tibouchi}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Invalid Curve Attacks in a {GLS} Setting}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {41--55}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_3}, doi = {10.1007/978-3-319-22425-1\_3}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KimT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuW15, author = {Tong Liu and Yazhe Wang}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {316--334}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_19}, doi = {10.1007/978-3-319-22425-1\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MaLHL15, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {79--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_6}, doi = {10.1007/978-3-319-22425-1\_6}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MaLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PengHLHX15, author = {Liqiang Peng and Lei Hu and Yao Lu and Zhangjie Huang and Jun Xu}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {67--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_5}, doi = {10.1007/978-3-319-22425-1\_5}, timestamp = {Sun, 10 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SadiahNF15, author = {Shahidatul Sadiah and Toru Nakanishi and Nobuo Funabiki}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {262--278}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_16}, doi = {10.1007/978-3-319-22425-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SadiahNF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SeoE15, author = {Jae Hong Seo and Keita Emura}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {21--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_2}, doi = {10.1007/978-3-319-22425-1\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SeoE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Secure Multi-Party Computation Using Polarizing Cards}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {281--297}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_17}, doi = {10.1007/978-3-319-22425-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SmythHM15, author = {Ben Smyth and Yoshikazu Hanatani and Hirofumi Muratani}, editor = {Keisuke Tanaka and Yuji Suga}, title = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_8}, doi = {10.1007/978-3-319-22425-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SunHQMSS15, author = {Siwei Sun and Lei Hu and Kexin Qiao and Xiaoshuang Ma and Jinyong Shan and Ling Song}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_7}, doi = {10.1007/978-3-319-22425-1\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TaketaniO15, author = {Shunsuke Taketani and Wakaha Ogata}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement of {UC} Secure Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {135--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_9}, doi = {10.1007/978-3-319-22425-1\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TaketaniO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TeruyaNSH15, author = {Tadanori Teruya and Koji Nuida and Kana Shimizu and Goichiro Hanaoka}, editor = {Keisuke Tanaka and Yuji Suga}, title = {On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {242--261}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_15}, doi = {10.1007/978-3-319-22425-1\_15}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TeruyaNSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangWL15, author = {Fuqun Wang and Kunpeng Wang and Bao Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {LWE-Based {FHE} with Better Parameters}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {175--192}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_11}, doi = {10.1007/978-3-319-22425-1\_11}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YagasakiS15, author = {Reina Yagasaki and Kazuo Sakiyama}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {335--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_20}, doi = {10.1007/978-3-319-22425-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YuKJ15, author = {Wei Yu and Kwang Ho Kim and Myong Song Jo}, editor = {Keisuke Tanaka and Yuji Suga}, title = {New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {56--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_4}, doi = {10.1007/978-3-319-22425-1\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YuKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangL15, author = {Tingting Zhang and Hongda Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {153--172}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_10}, doi = {10.1007/978-3-319-22425-1\_10}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {347--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_21}, doi = {10.1007/978-3-319-22425-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2015, editor = {Keisuke Tanaka and Yuji Suga}, title = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1}, doi = {10.1007/978-3-319-22425-1}, isbn = {978-3-319-22424-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AkagiN14, author = {Shoichi Akagi and Yasuyuki Nogami}, editor = {Maki Yoshida and Koichi Mouri}, title = {Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {240--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_18}, doi = {10.1007/978-3-319-09843-2\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AkagiN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BayHV14, author = {Asl{\'{\i}} Bay and Jialin Huang and Serge Vaudenay}, editor = {Maki Yoshida and Koichi Mouri}, title = {Improved Linear Cryptanalysis of Reduced-Round {MIBS}}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {204--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_16}, doi = {10.1007/978-3-319-09843-2\_16}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BayHV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChangHHYWC14, author = {Yun{-}An Chang and Wei{-}Chih Hong and Ming{-}Chun Hsiao and Bo{-}Yin Yang and An{-}Yeu Wu and Chen{-}Mou Cheng}, editor = {Maki Yoshida and Koichi Mouri}, title = {Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {174--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_14}, doi = {10.1007/978-3-319-09843-2\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChangHHYWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChatterjeeM14, author = {Sanjit Chatterjee and Sayantan Mukherjee}, editor = {Maki Yoshida and Koichi Mouri}, title = {Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {276--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_21}, doi = {10.1007/978-3-319-09843-2\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChatterjeeM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DattaN14, author = {Nilanjan Datta and Mridul Nandi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Characterization of {EME} with Linear Mixing}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {221--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_17}, doi = {10.1007/978-3-319-09843-2\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/DattaN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DuttaP14, author = {Avijit Dutta and Goutam Paul}, editor = {Maki Yoshida and Koichi Mouri}, title = {Deterministic Hard Fault Attack on Trivium}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {134--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_11}, doi = {10.1007/978-3-319-09843-2\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DuttaP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EndoK14, author = {Kosei Endo and Noboru Kunihiro}, editor = {Maki Yoshida and Koichi Mouri}, title = {On the Security Proof of an Authentication Protocol from Eurocrypt 2011}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {187--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_15}, doi = {10.1007/978-3-319-09843-2\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EndoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EvciK14, author = {Muhammet Ali Evci and Sel{\c{c}}uk Kavut}, editor = {Maki Yoshida and Koichi Mouri}, title = {{DPA} Resilience of Rotation-Symmetric S-boxes}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {146--157}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_12}, doi = {10.1007/978-3-319-09843-2\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EvciK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HajnyMT14, author = {Jan Hajny and Lukas Malina and Ondrej Tethal}, editor = {Maki Yoshida and Koichi Mouri}, title = {Privacy-Friendly Access Control Based on Personal Attributes}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_1}, doi = {10.1007/978-3-319-09843-2\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HajnyMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JiaLLM14, author = {Dingding Jia and Bao Li and Xianhui Lu and Qixiang Mei}, editor = {Maki Yoshida and Koichi Mouri}, title = {Related Key Secure {PKE} from Hash Proof Systems}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {250--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_19}, doi = {10.1007/978-3-319-09843-2\_19}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JiaLLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KrotofilL14, author = {Marina Krotofil and Jason Larsen}, editor = {Maki Yoshida and Koichi Mouri}, title = {Are You Threatening My Hazards?}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_2}, doi = {10.1007/978-3-319-09843-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KrotofilL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ObanaT14, author = {Satoshi Obana and Kazuya Tsuchida}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {88--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_7}, doi = {10.1007/978-3-319-09843-2\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Ohata0HM14, author = {Satsuya Ohata and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, editor = {Maki Yoshida and Koichi Mouri}, title = {More Constructions of Re-splittable Threshold Public Key Encryption}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {109--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_9}, doi = {10.1007/978-3-319-09843-2\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Ohata0HM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PalmieriP14, author = {Paolo Palmieri and Johan A. Pouwelse}, editor = {Maki Yoshida and Koichi Mouri}, title = {Key Management for Onion Routing in a True Peer to Peer Setting}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {62--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_5}, doi = {10.1007/978-3-319-09843-2\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PalmieriP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY14, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Complicating Process Identification by Replacing Process Information for Attack Avoidance}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {33--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_3}, doi = {10.1007/978-3-319-09843-2\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzakiYKI14, author = {Kuniyasu Suzaki and Toshiki Yagi and Kazukuni Kobara and Toshiaki Ishiyama}, editor = {Maki Yoshida and Koichi Mouri}, title = {Kernel Memory Protection by an Insertable Hypervisor Which Has {VM} Introspection and Stealth Breakpoints}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {48--61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_4}, doi = {10.1007/978-3-319-09843-2\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzakiYKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiY14, author = {Koutarou Suzuki and Kazuki Yoneyama}, editor = {Maki Yoshida and Koichi Mouri}, title = {Secure Multi-Party Computation for Elliptic Curves}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {98--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_8}, doi = {10.1007/978-3-319-09843-2\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TsengCL14, author = {Fu{-}Kuo Tseng and Rong{-}Jaye Chen and Bao{-}Shuh Paul Lin}, editor = {Maki Yoshida and Koichi Mouri}, title = {Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {266--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_20}, doi = {10.1007/978-3-319-09843-2\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TsengCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT14, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {72--87}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_6}, doi = {10.1007/978-3-319-09843-2\_6}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YamamotoTST14, author = {Dai Yamamoto and Masahiko Takenaka and Kazuo Sakiyama and Naoya Torii}, editor = {Maki Yoshida and Koichi Mouri}, title = {A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {158--173}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_13}, doi = {10.1007/978-3-319-09843-2\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Zhang14, author = {Hailong Zhang}, editor = {Maki Yoshida and Koichi Mouri}, title = {How to Effectively Decrease the Resource Requirement in Template Attack?}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {119--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_10}, doi = {10.1007/978-3-319-09843-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2014, editor = {Maki Yoshida and Koichi Mouri}, title = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2}, doi = {10.1007/978-3-319-09843-2}, isbn = {978-3-319-09842-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/0002H13, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {226--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_15}, doi = {10.1007/978-3-642-41383-4\_15}, timestamp = {Sun, 04 Aug 2024 19:41:44 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/0002H13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DengZCS13, author = {Yi Deng and Yang Zhang and Liang Cheng and Xiaoshan Sun}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Static Integer Overflow Vulnerability Detection in Windows Binary}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {19--35}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_2}, doi = {10.1007/978-3-642-41383-4\_2}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/DengZCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Hashimoto13, author = {Yasufumi Hashimoto}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Cryptanalysis of the Quaternion Rainbow}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {244--257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_16}, doi = {10.1007/978-3-642-41383-4\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Hashimoto13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HigoTY13, author = {Haruna Higo and Keisuke Tanaka and Kenji Yasunaga}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Game-Theoretic Security for Bit Commitment}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {303--318}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_20}, doi = {10.1007/978-3-642-41383-4\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HiranoHIM13, author = {Takato Hirano and Mitsuhiro Hattori and Takashi Ito and Nori Matsuda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {183--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_12}, doi = {10.1007/978-3-642-41383-4\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuangPST13, author = {Yun{-}Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {115--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_8}, doi = {10.1007/978-3-642-41383-4\_8}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IsshikiNT13, author = {Toshiyuki Isshiki and Manh Ha Nguyen and Keisuke Tanaka}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {290--302}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_19}, doi = {10.1007/978-3-642-41383-4\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KiyomuraT13, author = {Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Efficient Algorithm for Tate Pairing of Composite Order}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {201--216}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_13}, doi = {10.1007/978-3-642-41383-4\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaU13, author = {Kaoru Kurosawa and Takuma Ueda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod 2t{\textdollar}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {217--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_14}, doi = {10.1007/978-3-642-41383-4\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MoreiraFK13, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Grigory Kabatiansky}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {53--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_4}, doi = {10.1007/978-3-642-41383-4\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NaitoSWY13, author = {Yusuke Naito and Yu Sasaki and Lei Wang and Kan Yasuda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {83--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_6}, doi = {10.1007/978-3-642-41383-4\_6}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OgataKKM13, author = {Wakaha Ogata and Keita Koiwa and Akira Kanaoka and Shin'ichiro Matsuo}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Toward Practical Searchable Symmetric Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {151--167}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_10}, doi = {10.1007/978-3-642-41383-4\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OgataKKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PalmieriP13, author = {Paolo Palmieri and Olivier Pereira}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Unconditionally Secure Oblivious Transfer from Real Network Behavior}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {168--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_11}, doi = {10.1007/978-3-642-41383-4\_11}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PalmieriP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SanoOO13, author = {Shotaro Sano and Takuma Otsuka and Hiroshi G. Okuno}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Solving Google's Continuous Audio {CAPTCHA} with HMM-Based Automatic Speech Recognition}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {36--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_3}, doi = {10.1007/978-3-642-41383-4\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SanoOO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY13, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Secure Log Transfer by Replacing a Library in a Virtual Machine}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_1}, doi = {10.1007/978-3-642-41383-4\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TahaS13, author = {Mostafa M. I. Taha and Patrick Schaumont}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Differential Power Analysis of MAC-Keccak at Any Key-Length}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {68--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_5}, doi = {10.1007/978-3-642-41383-4\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TahaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TodoS13, author = {Yosuke Todo and Yu Sasaki}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its Application to {DFA}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {99--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_7}, doi = {10.1007/978-3-642-41383-4\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TodoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TsengLCL13, author = {Fu{-}Kuo Tseng and Yung{-}Hsiang Liu and Rong{-}Jaye Chen and Bao{-}Shuh Paul Lin}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Statistics on Encrypted Cloud Data}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {133--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_9}, doi = {10.1007/978-3-642-41383-4\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TsengLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT13, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {258--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_17}, doi = {10.1007/978-3-642-41383-4\_17}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {One-Round Authenticated Key Exchange without Implementation Trick}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {272--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_18}, doi = {10.1007/978-3-642-41383-4\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2013, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4}, doi = {10.1007/978-3-642-41383-4}, isbn = {978-3-642-41382-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/0007SSO12, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {170--181}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_11}, doi = {10.1007/978-3-642-34117-5\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChenJKLPS12, author = {Chien{-}Ning Chen and Nisha Jacob and Sebastian Kutzner and San Ling and Axel Poschmann and Sirote Saetang}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Standardized Signature Algorithms on Ultra-constrained 4-Bit {MCU}}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {37--50}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_3}, doi = {10.1007/978-3-642-34117-5\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChenJKLPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IsobeOM12, author = {Takanori Isobe and Toshihiro Ohigashi and Masakatu Morii}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Slide Cryptanalysis of Lightweight Stream Cipher {RAKAPOSHI}}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {138--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_9}, doi = {10.1007/978-3-642-34117-5\_9}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/IsobeOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JingAH12, author = {Yiming Jing and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Model-Based Conformance Testing for Android}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_1}, doi = {10.1007/978-3-642-34117-5\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JingAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KawachiTT12, author = {Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {123--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_8}, doi = {10.1007/978-3-642-34117-5\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KawachiTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KiyoshimaMO12, author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {216--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_14}, doi = {10.1007/978-3-642-34117-5\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KiyoshimaMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LuWPF12, author = {Jiqiang Lu and Yongzhuang Wei and Enes Pasalic and Pierre{-}Alain Fouque}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {197--215}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_13}, doi = {10.1007/978-3-642-34117-5\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/LuWPF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NekadoNI12, author = {Kenta Nekado and Yasuyuki Nogami and Kengo Iokibe}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Very Short Critical Path Implementation of {AES} with Direct Logic Gates}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {51--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_4}, doi = {10.1007/978-3-642-34117-5\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NekadoNI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PohMZ12, author = {Geong Sen Poh and Moesfa Soeheila Mohamad and Muhammad Reza Z'aba}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Structured Encryption for Conceptual Graphs}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {105--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_7}, doi = {10.1007/978-3-642-34117-5\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PohMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12, author = {Yu Sasaki and Lei Wang and Yasuhiro Takasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Boomerang Distinguishers for Full {HAS-160} Compression Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {156--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_10}, doi = {10.1007/978-3-642-34117-5\_10}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiYF12, author = {Itsuki Suzuki and Maki Yoshida and Toru Fujiwara}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Generic Construction of {GUC} Secure Commitment in the {KRK} Model}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {244--260}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_16}, doi = {10.1007/978-3-642-34117-5\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/VivekSR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Compact Stateful Encryption Schemes with Ciphertext Verifiability}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {87--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_6}, doi = {10.1007/978-3-642-34117-5\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/VivekSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangCZ12, author = {Jingjing Wang and Kefei Chen and Shixiong Zhu}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Annihilators of Fast Discrete Fourier Spectra Attacks}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {182--196}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_12}, doi = {10.1007/978-3-642-34117-5\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YasudaTS12, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {19--36}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_2}, doi = {10.1007/978-3-642-34117-5\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YasudaTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yoneyama12, author = {Kazuki Yoneyama}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {69--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_5}, doi = {10.1007/978-3-642-34117-5\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yoneyama12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhuTH12, author = {Youwen Zhu and Tsuyoshi Takagi and Liusheng Huang}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Efficient Secure Primitive for Privacy Preserving Distributed Computations}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {233--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_15}, doi = {10.1007/978-3-642-34117-5\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhuTH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2012, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5}, doi = {10.1007/978-3-642-34117-5}, isbn = {978-3-642-34116-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Fujioka11, author = {Atsushi Fujioka}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Characterization of Strongly Secure Authenticated Key Exchanges without {NAXOS} Technique}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {33--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_3}, doi = {10.1007/978-3-642-25141-2\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Fujioka11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HayashiMYFO11, author = {Ryotaro Hayashi and Tatsuyuki Matsushita and Takuya Yoshida and Yoshihiro Fujii and Koji Okada}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {210--229}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_14}, doi = {10.1007/978-3-642-25141-2\_14}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HayashiMYFO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Kuribayashi11, author = {Minoru Kuribayashi}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_1}, doi = {10.1007/978-3-642-25141-2\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Kuribayashi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MitsunagaMO11, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {51--64}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_4}, doi = {10.1007/978-3-642-25141-2\_4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MitsunagaMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NuidaAKMN11, author = {Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {144--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_10}, doi = {10.1007/978-3-642-25141-2\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NuidaAKMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OguraKUO11, author = {Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Cryptographic Pairings Based on Elliptic Nets}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {65--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_5}, doi = {10.1007/978-3-642-25141-2\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OguraKUO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PaulMR11, author = {Goutam Paul and Subhamoy Maitra and Shashwat Raizada}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {A Theoretical Analysis of the Structure of {HC-128}}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {161--177}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_11}, doi = {10.1007/978-3-642-25141-2\_11}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/PaulMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PfohSE11, author = {Jonas Pfoh and Christian A. Schneider and Claudia Eckert}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Nitro: Hardware-Based System Call Tracing for Virtual Machines}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {96--112}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_7}, doi = {10.1007/978-3-642-25141-2\_7}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/PfohSE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PortokalidisK11, author = {Georgios Portokalidis and Angelos D. Keromytis}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {{REASSURE:} {A} Self-contained Mechanism for Healing Software Using Rescue Points}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {16--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_2}, doi = {10.1007/978-3-642-25141-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PortokalidisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakaiEHKO11, author = {Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Yutaka Kawai and Kazumasa Omote}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Towards Restricting Plaintext Space in Public Key Encryption}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {193--209}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_13}, doi = {10.1007/978-3-642-25141-2\_13}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakaiEHKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SasakiTSO11, author = {Yu Sasaki and Naoyuki Takayanagi and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {178--192}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_12}, doi = {10.1007/978-3-642-25141-2\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SelviVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Identity-Based Deterministic Signature Scheme without Forking-Lemma}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {79--95}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_6}, doi = {10.1007/978-3-642-25141-2\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SelviVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShojaeiML11, author = {Maryam Shojaei and Naser Movahhedinia and Behrouz Tork Ladani}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {An Entropy Based Approach for DDoS Attack Detection in {IEEE} 802.16 Based Networks}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {129--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_9}, doi = {10.1007/978-3-642-25141-2\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ShojaeiML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZavouPK11, author = {Angeliki Zavou and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Taint-Exchange: {A} Generic System for Cross-Process and Cross-Host Taint Tracking}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {113--128}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_8}, doi = {10.1007/978-3-642-25141-2\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZavouPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2011, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2}, doi = {10.1007/978-3-642-25141-2}, isbn = {978-3-642-25140-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AlicherryK10, author = {Mansoor Alicherry and Angelos D. Keromytis}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Securing {MANET} Multicast Using {DIPLOMA}}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {232--250}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_16}, doi = {10.1007/978-3-642-16825-3\_16}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlicherryK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BangdaoRKN10, author = {Chen Bangdao and A. W. Roscoe and Ronald Kainda and Long Hoang Nguyen}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {The Missing Link: Human Interactive Security Protocols in Mobile Payment}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {94--109}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BangdaoRKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BardakHMS10, author = {Ulas Bardak and Seiya Hasegawa and Kazuko Mishima and Takayuki Saito}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Automated Scheduling of Volunteers through Adapting a Nurse Scheduling Infrastructure}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {110--120}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BardakHMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BiskupT10, author = {Joachim Biskup and Cornelia Tadros}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Policy-Based Secrecy in the Runs {\&} Systems Framework and Controlled Query Evaluation}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {60--77}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BiskupT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Bohme10, author = {Rainer B{\"{o}}hme}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Security Metrics and Security Investment Models}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {10--24}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_2}, doi = {10.1007/978-3-642-16825-3\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Bohme10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CalafateCNMC10, author = {Carlos Miguel Tavares Calafate and Javier Campos and Marga N{\'{a}}cher and Pietro Manzoni and Juan{-}Carlos Cano}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {{A-HIP:} {A} Solution Offering Secure and Anonymous Communications in MANETs}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {217--231}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_15}, doi = {10.1007/978-3-642-16825-3\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CalafateCNMC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EmuraHS10, author = {Keita Emura and Goichiro Hanaoka and Yusuke Sakai}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Group Signature Implies {PKE} with Non-interactive Opening and Threshold {PKE}}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {181--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_13}, doi = {10.1007/978-3-642-16825-3\_13}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EmuraHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FujiokaSY10, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {164--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_12}, doi = {10.1007/978-3-642-16825-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FujiokaSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FukaseY10, author = {Masaharu Fukase and Kazunori Yamaguchi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Exhaustive Search for Finding a Very Short Vector in High-Dimensional Lattices}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {26--41}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FukaseY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HalunenR10, author = {Kimmo Halunen and Juha R{\"{o}}ning}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Preimage Attacks against Variants of Very Smooth Hash}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {251--266}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_17}, doi = {10.1007/978-3-642-16825-3\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HalunenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HarjumaaT10, author = {Lasse Harjumaa and Ilkka Tervonen}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Introducing Mitigation Use Cases to Enhance the Scope of Test Cases}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {337--353}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_23}, doi = {10.1007/978-3-642-16825-3\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HarjumaaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Hashimoto10, author = {Yasufumi Hashimoto}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {On Small Secret Key Attack against {RSA} with High Bits Known Prime Factor}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {14--25}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Hashimoto10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10, author = {Tadashi Iyama and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Tsuyoshi Takagi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Implementation of Pairing on {BREW} Mobile Phones}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {326--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_22}, doi = {10.1007/978-3-642-16825-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IzuTY10, author = {Tetsuya Izu and Masahiko Takenaka and Takashi Yoshioka}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {A Prototype System for Ensuring Integrity of Extracted Video Data (Extended Abstract)}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {121--131}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IzuTY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IzumidaFM10, author = {Tomonori Izumida and Kokichi Futatsugi and Akira Mori}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {A Generic Binary Analysis Method for Malware}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {199--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_14}, doi = {10.1007/978-3-642-16825-3\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IzumidaFM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JiangHDS10, author = {Xin Jiang and Lei Hu and Jintai Ding and Siwei Sun}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {On the Kipnis-Shamir Method Solving the MinRank Problem}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {1--13}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JustusL10, author = {Benjamin Justus and Daniel Loebenberger}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Differential Addition in Generalized Edwards Coordinates}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {316--325}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_21}, doi = {10.1007/978-3-642-16825-3\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JustusL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KlonowskiPSS10, author = {Marek Klonowski and Michal Przykucki and Tomasz Struminski and Malgorzata Sulkowska}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Practical Universal Random Sampling}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {84--100}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_7}, doi = {10.1007/978-3-642-16825-3\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/KlonowskiPSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Kuribayashi10, author = {Minoru Kuribayashi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Experimental Assessment of Probabilistic Fingerprinting Codes over {AWGN} Channel}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {117--132}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_9}, doi = {10.1007/978-3-642-16825-3\_9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Kuribayashi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LeB10, author = {Thanh{-}Ha Le and Ma{\"{e}}l Berthier}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Mutual Information Analysis under the View of Higher-Order Statistics}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {285--300}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_19}, doi = {10.1007/978-3-642-16825-3\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LeB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuLLZ10, author = {Yamin Liu and Bao Li and Xianhui Lu and Yazhe Zhang}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {{PA1} and {IND-CCA2} Do Not Guarantee {PA2:} Brief Examples}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {40--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_4}, doi = {10.1007/978-3-642-16825-3\_4}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuLLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MaitraSS10, author = {Subhamoy Maitra and Santanu Sarkar and Sourav Sen Gupta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Publishing Upper Half of {RSA} Decryption Exponent}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {25--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_3}, doi = {10.1007/978-3-642-16825-3\_3}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/MaitraSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MitsunagaMO10, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {149--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_11}, doi = {10.1007/978-3-642-16825-3\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MitsunagaMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Niitsoo10, author = {Margus Niitsoo}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Optimal Adversary Behavior for the Serial Model of Financial Attack Trees}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {354--370}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_24}, doi = {10.1007/978-3-642-16825-3\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Niitsoo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OguraYKU10, author = {Naoki Ogura and Go Yamamoto and Tetsutaro Kobayashi and Shigenori Uchiyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {70--83}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_6}, doi = {10.1007/978-3-642-16825-3\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OguraYKU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakaiHKO10, author = {Yusuke Sakai and Goichiro Hanaoka and Kaoru Kurosawa and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the {RO} Model}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {55--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_5}, doi = {10.1007/978-3-642-16825-3\_5}, timestamp = {Mon, 21 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sasaki10, author = {Yu Sasaki}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening \emph{ShiftRow} Parameter}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {301--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_20}, doi = {10.1007/978-3-642-16825-3\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sasaki10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatohU10, author = {Fumiko Satoh and Naohiko Uramoto}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Validating Security Policy Conformance with WS-Security Requirements}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {133--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_10}, doi = {10.1007/978-3-642-16825-3\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatohU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sjoblom10, author = {Olli Sj{\"{o}}blom}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Data Mining in Aviation Safety}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {132--148}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sjoblom10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Vaidya10, author = {Jaideep Vaidya}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Automating Security Configuration and Administration: An Access Control Perspective}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {1--9}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_1}, doi = {10.1007/978-3-642-16825-3\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Vaidya10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Wiese10, author = {Lena Wiese}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {101--116}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_8}, doi = {10.1007/978-3-642-16825-3\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Wiese10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YajimaS10, author = {Jun Yajima and Takeshi Shimoyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Matrix Representation of Conditions for the Collision Attack of {SHA-1} and Its Application to the Message Modification}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {267--284}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_18}, doi = {10.1007/978-3-642-16825-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YajimaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10, author = {Kazuki Yoneyama and Masayuki Terada and Sadayuki Hongo and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {42--59}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoshihamaMM10, author = {Sachiko Yoshihama and Takuya Mishina and Tsutomu Matsumoto}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Web-Based Data Leakage Prevention}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {78--93}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoshihamaMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3}, doi = {10.1007/978-3-642-16825-3}, isbn = {978-3-642-16824-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010s, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, isbn = {978-4-915256-78-3}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CheongK09, author = {Kai{-}Yuen Cheong and Takeshi Koshiba}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Reducing Complexity Assumptions for Oblivious Transfer}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {110--124}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_8}, doi = {10.1007/978-3-642-04846-3\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CheongK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChoyY09, author = {Jiali Choy and Huihui Yap}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Impossible Boomerang Attack for Block Cipher Structures}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {22--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_3}, doi = {10.1007/978-3-642-04846-3\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChoyY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuaLSR09, author = {Jingyu Hua and Mingchu Li and Kouichi Sakurai and Yizhi Ren}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Efficient Intrusion Detection Based on Static Analysis and Stack Walks}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {158--173}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_11}, doi = {10.1007/978-3-642-04846-3\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HuaLSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JakubowskiSV09, author = {Mariusz H. Jakubowski and Chit Wei Saw and Ramarathnam Venkatesan}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Tamper-Tolerant Software: Modeling and Implementation}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {125--139}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_9}, doi = {10.1007/978-3-642-04846-3\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JakubowskiSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KimFU09, author = {Minkyu Kim and Atsushi Fujioka and Berkant Ustaoglu}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Strongly Secure Authenticated Key Exchange without NAXOS' Approach}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {174--191}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_12}, doi = {10.1007/978-3-642-04846-3\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/KimFU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakaiMKM09, author = {Yasumasa Nakai and Takahiro Matsuda and Wataru Kitada and Kanta Matsuura}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {A Generic Construction of Timed-Release Encryption with Pre-open Capability}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {53--70}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_5}, doi = {10.1007/978-3-642-04846-3\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakaiMKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Nuida09, author = {Koji Nuida}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {140--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_10}, doi = {10.1007/978-3-642-04846-3\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Nuida09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Preneel09, author = {Bart Preneel}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {The Future of Cryptographic Algorithms}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {1--2}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_1}, doi = {10.1007/978-3-642-04846-3\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Preneel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakashitaSYTOKN09, author = {Taiki Sakashita and Yoichi Shibata and Takumi Yamamoto and Kenta Takahashi and Wakaha Ogata and Hiroaki Kikuchi and Masakatsu Nishigaki}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {A Proposal of Efficient Remote Biometric Authentication Protocol}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {212--227}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_14}, doi = {10.1007/978-3-642-04846-3\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SakashitaSYTOKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SekarP09, author = {Gautham Sekar and Bart Preneel}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Improved Distinguishing Attacks on {HC-256}}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {38--52}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_4}, doi = {10.1007/978-3-642-04846-3\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SekarP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SelviVSR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Chandrasekaran Pandu Rangan}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {71--88}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_6}, doi = {10.1007/978-3-642-04846-3\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SelviVSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ThorncharoensriSM09, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Universal Designated Verifier Signatures with Threshold-Signers}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {89--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_7}, doi = {10.1007/978-3-642-04846-3\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ThorncharoensriSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangSSO09, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Bit-Free Collision: Application to {APOP} Attack}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {3--21}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_2}, doi = {10.1007/978-3-642-04846-3\_2}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YiTO09, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {ID-Based Group Password-Authenticated Key Exchange}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {192--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_13}, doi = {10.1007/978-3-642-04846-3\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/YiTO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2009, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3}, doi = {10.1007/978-3-642-04846-3}, isbn = {978-3-642-04845-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AnPP08, author = {Dong Chan An and So Mi Park and Seog Park}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Efficient Secure Labeling Method under Dynamic {XML} Data Streams}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {246--260}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_17}, doi = {10.1007/978-3-540-89598-5\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AnPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BazinBM08, author = {Cyril Bazin and Jean{-}Marie Le Bars and Jacques Madelaine}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {A Novel Framework for Watermarking: The Data-Abstracted Approach}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {201--217}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_13}, doi = {10.1007/978-3-540-89598-5\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BazinBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BringerCPZ08, author = {Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {219--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_15}, doi = {10.1007/978-3-540-89598-5\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CaryJJV08, author = {Matthew Cary and Matthias Jacob and Mariusz H. Jakubowski and Ramarathnam Venkatesan}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {The Long-Short-Key Primitive and Its Applications to Key Security}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {279--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_19}, doi = {10.1007/978-3-540-89598-5\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CaryJJV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChidaT08, author = {Koji Chida and Katsumi Takahashi}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Privacy Preserving Computations without Public Key Cryptographic Operation}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {184--200}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_12}, doi = {10.1007/978-3-540-89598-5\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChidaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Grzeskowiak08, author = {Maciej Grzeskowiak}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {On Generating Elements of Orders Dividing p\({}^{\mbox{2k}}\){\(\pm\)}p\({}^{\mbox{k}}\)+1}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {1--19}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_1}, doi = {10.1007/978-3-540-89598-5\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Grzeskowiak08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/GuoMC08, author = {Fuchun Guo and Yi Mu and Zhide Chen}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {49--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_4}, doi = {10.1007/978-3-540-89598-5\_4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/GuoMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HanaokaIOW08, author = {Goichiro Hanaoka and Hideki Imai and Kazuto Ogawa and Hajime Watanabe}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Chosen Ciphertext Secure Public Key Encryption with a Simple Structure}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {20--33}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_2}, doi = {10.1007/978-3-540-89598-5\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HanaokaIOW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HoriSST08, author = {Yohei Hori and Akashi Satoh and Hirofumi Sakane and Kenji Toda}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Bitstream Encryption and Authentication Using {AES-GCM} in Dynamically Reconfigurable Systems}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {261--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_18}, doi = {10.1007/978-3-540-89598-5\_18}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HoriSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JacobJNSV08, author = {Matthias Jacob and Mariusz H. Jakubowski and Prasad Naldurg and Chit Wei Saw and Ramarathnam Venkatesan}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {The Superdiversifier: Peephole Individualization for Software Protection}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {100--120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_7}, doi = {10.1007/978-3-540-89598-5\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JacobJNSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LamCC08, author = {Ieng{-}Fat Lam and Kuan{-}Ta Chen and Ling{-}Jyh Chen}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Involuntary Information Leakage in Social Network Services}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {167--183}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_11}, doi = {10.1007/978-3-540-89598-5\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LamCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LocastoBK08, author = {Michael E. Locasto and Matthew Burnside and Angelos D. Keromytis}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Online Network Forensics for Automatic Repair Validation}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {136--151}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_9}, doi = {10.1007/978-3-540-89598-5\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LocastoBK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LocastoSCKS08, author = {Michael E. Locasto and Angelos Stavrou and Gabriela F. Cretu and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Return Value Predictability Profiles for Self-healing}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {152--166}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_10}, doi = {10.1007/978-3-540-89598-5\_10}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LocastoSCKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Menezes08, author = {Alfred Menezes}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {The Elliptic Curve Discrete Logarithm Problem: State of the Art}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_14}, doi = {10.1007/978-3-540-89598-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Menezes08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OguraU08, author = {Naoki Ogura and Shigenori Uchiyama}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Remarks on the Attack of Fouque et al. against the lIC Scheme}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {34--48}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_3}, doi = {10.1007/978-3-540-89598-5\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OguraU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ParkCLH08, author = {Heewan Park and Seokwoo Choi and Hyun{-}il Lim and Taisook Han}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Detecting Java Theft Based on Static {API} Trace Birthmark}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {121--135}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_8}, doi = {10.1007/978-3-540-89598-5\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ParkCLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SalaiwarakulR08, author = {Anongporn Salaiwarakul and Mark Ryan}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Analysis of a Biometric Authentication Protocol for Signature Creation Application}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {231--245}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_16}, doi = {10.1007/978-3-540-89598-5\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SalaiwarakulR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Tan08, author = {Chik How Tan}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Signcryption Scheme in Multi-user Setting without Random Oracles}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {64--82}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_5}, doi = {10.1007/978-3-540-89598-5\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Tan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoshidaO08, author = {Takuya Yoshida and Koji Okada}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {83--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_6}, doi = {10.1007/978-3-540-89598-5\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoshidaO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2008, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5}, doi = {10.1007/978-3-540-89598-5}, isbn = {978-3-540-89597-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AnckaertJVB07, author = {Bertrand Anckaert and Mariusz H. Jakubowski and Ramarathnam Venkatesan and Koen De Bosschere}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Run-Time Randomization to Mitigate Tampering}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {153--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_11}, doi = {10.1007/978-3-540-75651-4\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AnckaertJVB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AokiSU07, author = {Kazumaro Aoki and Takeshi Shimoyama and Hiroki Ueda}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Experiments on the Linear Algebra Step in the Number Field Sieve}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {58--73}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_5}, doi = {10.1007/978-3-540-75651-4\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AokiSU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AthanasopoulosRAM07, author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {{GAS:} Overloading a File Sharing Network as an Anonymizing System}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {365--379}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_25}, doi = {10.1007/978-3-540-75651-4\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AthanasopoulosRAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BressonMS07, author = {Emmanuel Bresson and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {292--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_20}, doi = {10.1007/978-3-540-75651-4\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasM07, author = {Ahto Buldas and Triinu M{\"{a}}gi}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Practical Security Analysis of E-Voting Systems}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {320--335}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_22}, doi = {10.1007/978-3-540-75651-4\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Caballero-GilC07, author = {Pino Caballero{-}Gil and C{\'{a}}ndido Caballero{-}Gil}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {A Global Authentication Scheme for Mobile Ad-Hoc Networks}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {105--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_8}, doi = {10.1007/978-3-540-75651-4\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Caballero-GilC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChidaSK07, author = {Koji Chida and Osamu Shionoiri and Atsushi Kanai}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Secure Anonymous Communications with Practical Anonymity Revocation Scheme}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {352--364}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_24}, doi = {10.1007/978-3-540-75651-4\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChidaSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FanH07, author = {Chun{-}I Fan and Vincent Shi{-}Ming Huang}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {412--427}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_28}, doi = {10.1007/978-3-540-75651-4\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FanH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HadaS07, author = {Satoshi Hada and Kouichi Sakurai}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {1--12}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_1}, doi = {10.1007/978-3-540-75651-4\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HadaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HayashiKM07, author = {Naoki Hayashi and Minoru Kuribayashi and Masakatu Morii}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {28--43}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_3}, doi = {10.1007/978-3-540-75651-4\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HayashiKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuangW07, author = {Qiong Huang and Duncan S. Wong}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Generic Certificateless Encryption in the Standard Model}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {278--291}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_19}, doi = {10.1007/978-3-540-75651-4\_19}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HurPY07, author = {Junbeom Hur and Chanil Park and Hyunsoo Yoon}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {An Efficient Pre-authentication Scheme for {IEEE} 802.11-Based Vehicular Networks}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {121--136}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_9}, doi = {10.1007/978-3-540-75651-4\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HurPY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JurgensonW07, author = {Aivo J{\"{u}}rgenson and Jan Willemson}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Processing Multi-parameter Attacktrees with Estimated Parameter Values}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {308--319}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_21}, doi = {10.1007/978-3-540-75651-4\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JurgensonW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KidaSST07, author = {Koji Kida and Hisashi Sakamoto and Hideo Shimazu and Hiroyuki Tarumi}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {InfoCage: {A} Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {246--261}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_17}, doi = {10.1007/978-3-540-75651-4\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KidaSST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KimRSS07, author = {Hyung Chan Kim and Rudrapatna S. Ramakrishna and Wook Shin and Kouichi Sakurai}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Enforcement of Integrated Security Policy in Trusted Operating Systems}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {214--229}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_15}, doi = {10.1007/978-3-540-75651-4\_15}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KimRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KondoS07, author = {Satoshi Kondo and Naoshi Sato}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Botnet Traffic Detection Techniques by C{\&}C Session Classification Using {SVM}}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {91--104}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_7}, doi = {10.1007/978-3-540-75651-4\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KondoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KutylowskiZ07, author = {Miroslaw Kutylowski and Filip Zag{\'{o}}rski}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Verifiable Internet Voting Solving Secure Platform Problem}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {199--213}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_14}, doi = {10.1007/978-3-540-75651-4\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KutylowskiZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Layouni07, author = {Mohamed Layouni}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Accredited Symmetrically Private Information Retrieval}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {262--277}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_18}, doi = {10.1007/978-3-540-75651-4\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Layouni07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LeuHJ07, author = {Fang{-}Yie Leu and Kai{-}Wei Hu and Fuu{-}Cheng Jiang}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Intrusion Detection and Identification System Using Data Mining and Forensic Techniques}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {137--152}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_10}, doi = {10.1007/978-3-540-75651-4\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LeuHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuCWM07, author = {Dennis Y. W. Liu and Shuang Chang and Duncan S. Wong and Yi Mu}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Nominative Signature from Ring Signature}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {396--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_27}, doi = {10.1007/978-3-540-75651-4\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuCWM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MishinaYK07, author = {Takuya Mishina and Sachiko Yoshihama and Michiharu Kudo}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Fine-Grained Sticky Provenance Architecture for Office Documents}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {336--351}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_23}, doi = {10.1007/978-3-540-75651-4\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MishinaYK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MiwaMEYS07, author = {Shinsuke Miwa and Toshiyuki Miyachi and Masashi Eto and Masashi Yoshizumi and Yoichi Shinoda}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Design Issues of an Isolated Sandbox Used to Analyze Malwares}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {13--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_2}, doi = {10.1007/978-3-540-75651-4\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MiwaMEYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakajimaIT07, author = {Toshiya Nakajima and Tetsuya Izu and Tsuyoshi Takagi}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Reduction Optimal Trinomials for Efficient Software Implementation of the eta\({}_{\mbox{T}}\) Pairing}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {44--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_4}, doi = {10.1007/978-3-540-75651-4\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakajimaIT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/RenLTY07, author = {Yi Ren and Min Luo and Zukai Tang and Lingqing Ye}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {A Composite Privacy Protection Model}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {380--395}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_26}, doi = {10.1007/978-3-540-75651-4\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/RenLTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinKI07, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {444--458}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_30}, doi = {10.1007/978-3-540-75651-4\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShinKI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiK07, author = {Kazuhiro Suzuki and Kaoru Kurosawa}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {How to Find Many Collisions of 3-Pass {HAVAL}}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {428--443}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_29}, doi = {10.1007/978-3-540-75651-4\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiMO07, author = {Kazuhisa Suzuki and Koichi Mouri and Eiji Okubo}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {\emph{Salvia} : {A} Privacy-Aware Operating System for Prevention of Data Leakage}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {230--245}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_16}, doi = {10.1007/978-3-540-75651-4\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiMO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TsangCS07, author = {Patrick P. Tsang and Sherman S. M. Chow and Sean W. Smith}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Batch Pairing Delegation}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {74--90}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_6}, doi = {10.1007/978-3-540-75651-4\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/TsangCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ViejoSD07, author = {Alexandre Viejo and Francesc Seb{\'{e}} and Josep Domingo{-}Ferrer}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {185--198}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_13}, doi = {10.1007/978-3-540-75651-4\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ViejoSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YakutP07, author = {Ibrahim Yakut and Huseyin Polat}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Privacy-Preserving Eigentaste-Based Collaborative Filtering}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {169--184}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_12}, doi = {10.1007/978-3-540-75651-4\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YakutP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2007, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4}, doi = {10.1007/978-3-540-75651-4}, isbn = {978-3-540-75650-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AlvarezGMTV06, author = {Anna V. {\'{A}}lvarez and Karen A. Garc{\'{\i}}a and Ra{\'{u}}l Monroy and Luis A. Trejo and Jes{\'{u}}s V{\'{a}}zquez}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Tool for Managing Security Policies in Organisations}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {378--388}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_27}, doi = {10.1007/11908739\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlvarezGMTV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AuLYW06, author = {Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {ID-Based Ring Signature Scheme Secure in the Standard Model}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {1--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_1}, doi = {10.1007/11908739\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AuLYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChenK06, author = {Yi{-}Ming Chen and Yung{-}Wei Kao}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Information Flow Query and Verification for Security Policy of Security-Enhanced Linux}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {389--404}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_28}, doi = {10.1007/11908739\_28}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChenK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChoiPY06, author = {Seung Geol Choi and Kunsoo Park and Moti Yung}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Short Traceable Signatures Based on Bilinear Pairings}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {88--103}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_7}, doi = {10.1007/11908739\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChoiPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DrangerSS06, author = {Stephen Dranger and Robert H. Sloan and Jon A. Solworth}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {The Complexity of Discretionary Access Control}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {405--420}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_29}, doi = {10.1007/11908739\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DrangerSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/GarciaR06, author = {Flavio D. Garcia and Peter van Rossum}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Sound Computational Interpretation of Symbolic Hashes in the Standard Model}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {33--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_3}, doi = {10.1007/11908739\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/GarciaR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HadaS06, author = {Satoshi Hada and Kouichi Sakurai}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Ciphertext-Auditable Public Key Encryption}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {308--321}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_22}, doi = {10.1007/11908739\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HadaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HoepmanHJOS06, author = {Jaap{-}Henk Hoepman and Engelbert Hubbers and Bart Jacobs and Martijn Oostdijk and Ronny Wichers Schreur}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Crossing Borders: Security and Privacy Issues of the European e-Passport}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {152--167}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_11}, doi = {10.1007/11908739\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HoepmanHJOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JinLZQ06, author = {Hai Jin and Zhensong Liao and Deqing Zou and Weizhong Qiang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A New Approach to Hide Policy for Automated Trust Negotiation}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {168--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_12}, doi = {10.1007/11908739\_12}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JinLZQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KangISL06, author = {In Koo Kang and Dong{-}Hyuck Im and Young{-}Ho Suh and Heung{-}Kyu Lee}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Real-Time Watermark Embedding for High Resolution Video Watermarking}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {227--238}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_16}, doi = {10.1007/11908739\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KangISL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KempfWRG06, author = {James Kempf and Jonathan Wood and Zulfikar Ramzan and Craig Gentry}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {{IP} Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {196--211}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_14}, doi = {10.1007/11908739\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KempfWRG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KimRCJ06, author = {Mooseop Kim and Jaecheol Ryou and YongJe Choi and Sungik Jun}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Low Power {AES} Hardware Architecture for Radio Frequency Identification}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {353--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_25}, doi = {10.1007/11908739\_25}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KimRCJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KwonJL06, author = {Jeong Ok Kwon and Ik Rae Jeong and Dong Hoon Lee}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {322--336}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_23}, doi = {10.1007/11908739\_23}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/KwonJL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KwonLM06, author = {Young Chul Kwon and Sang Won Lee and Songchun Moon}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Personal Computer Privacy: Analysis for Korean {PC} Users}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {76--87}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_6}, doi = {10.1007/11908739\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KwonLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuSW06, author = {Joseph K. Liu and Willy Susilo and Duncan S. Wong}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Ring Signature with Designated Linkability}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {104--119}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_8}, doi = {10.1007/11908739\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MukhopadhyayS06, author = {Sourav Mukhopadhyay and Palash Sarkar}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {On the Effectiveness of {TMTO} and Exhaustive Search Attacks}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {337--352}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_24}, doi = {10.1007/11908739\_24}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MukhopadhyayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakanishiF06, author = {Toru Nakanishi and Nobuo Funabiki}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {17--32}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_2}, doi = {10.1007/11908739\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakanishiF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NohKKN06, author = {Sang{-}Kyun Noh and DongKook Kim and Yongmin Kim and Bong{-}Nam Noh}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Modeling of Network Intrusions Based on the Multiple Transition Probability}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {278--291}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_20}, doi = {10.1007/11908739\_20}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NohKKN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnishiO06, author = {Junji Onishi and Tsukasa Ono}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Study of Detection Method of Printed Image Alteration Using Digital Watermark}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {212--226}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_15}, doi = {10.1007/11908739\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnishiO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ParkCLC06, author = {Sang{-}Hyun Park and Hoon Choi and Sang{-}Han Lee and Taejoo Chang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {The High-Speed Packet Cipher System Suitable for Small Sized Data}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {364--377}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_26}, doi = {10.1007/11908739\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ParkCLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ParkLKLK06, author = {Yongsu Park and Younho Lee and Heeyoul Kim and Gil{-}Joo Lee and Il{-}Hee Kim}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {268--277}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_19}, doi = {10.1007/11908739\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ParkLKLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakakiYO06, author = {Hiroshi Sakaki and Kazuo Yanoo and Ryuichi Ogawa}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Model-Based Method for Security Configuration Verification}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {60--75}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_5}, doi = {10.1007/11908739\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakakiYO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Savola06, author = {Reijo Savola}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Requirement Centric Framework for Information Security Evaluation}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {48--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_4}, doi = {10.1007/11908739\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Savola06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShiYZ06, author = {Yi Shi and Xinyu Yang and Huijun Zhu}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {252--267}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_18}, doi = {10.1007/11908739\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShiYZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Tan06, author = {Chik How Tan}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Chosen Ciphertext Security from Identity-Based Encryption Without \emph{Strong} Condition}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {292--307}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_21}, doi = {10.1007/11908739\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Tan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TartaryW06, author = {Christophe Tartary and Huaxiong Wang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Rateless Codes for the Multicast Stream Authentication Problem}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {136--151}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_10}, doi = {10.1007/11908739\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TartaryW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TrabelsiEFR06, author = {Zouheir Trabelsi and Hesham El{-}Sayed and Lilia Frikha and Tamer Rabie}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Traceroute Based {IP} Channel for Sending Hidden Short Messages}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {421--436}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_30}, doi = {10.1007/11908739\_30}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/TrabelsiEFR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TunstallMM06, author = {Michael Tunstall and Constantinos Markantonakis and Keith Mayes}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Inhibiting Card Sharing Attacks}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {239--251}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_17}, doi = {10.1007/11908739\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/TunstallMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WuSMZ06, author = {Qianhong Wu and Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Ad Hoc Group Signatures}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {120--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_9}, doi = {10.1007/11908739\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/WuSMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangPS06, author = {Xinwen Zhang and Francesco Parisi{-}Presicce and Ravi S. Sandhu}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {179--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_13}, doi = {10.1007/11908739\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2006, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739}, doi = {10.1007/11908739}, isbn = {3-540-47699-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.