default search action
10. IWSEC 2015: Nara, Japan
- Keisuke Tanaka, Yuji Suga:
Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings. Lecture Notes in Computer Science 9241, Springer 2015, ISBN 978-3-319-22424-4
Identity-Based Encryption
- Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun:
Identity-Based Lossy Encryption from Learning with Errors. 3-20 - Jae Hong Seo, Keita Emura:
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption. 21-38
Elliptic Curve Cryptography
- Taechan Kim, Mehdi Tibouchi:
Invalid Curve Attacks in a GLS Setting. 41-55 - Wei Yu, Kwang Ho Kim, Myong Song Jo:
New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates. 56-64
Factoring
- Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu:
Implicit Factorization of RSA Moduli Revisited (Short Paper). 67-76
Symmetric Cryptanalysis
- Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. 79-96 - Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song:
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. 97-111
Provable Security
- Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani:
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge. 115-134 - Shunsuke Taketani, Wakaha Ogata:
Improvement of UC Secure Searchable Symmetric Encryption Scheme. 135-152 - Tingting Zhang, Hongda Li:
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. 153-172
LWE-Based Encryption
- Fuqun Wang, Kunpeng Wang, Bao Li:
LWE-Based FHE with Better Parameters. 175-192 - Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun:
Improved Efficiency of MP12. 193-210
Secret Sharing
- Hidetaka Hoshino, Satoshi Obana:
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings. 213-222
Privacy-Preserving and Anonymity
- Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi:
k-Anonymous Microdata Release via Post Randomisation Method. 225-241 - Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka:
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data. 242-261 - Shahidatul Sadiah, Toru Nakanishi, Nobuo Funabiki:
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes. 262-278
Secure Protocol
- Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. 281-297
Systems Security
- Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue:
An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks. 301-315 - Tong Liu, Yazhe Wang:
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data. 316-334 - Reina Yagasaki, Kazuo Sakiyama:
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). 335-344
Security in Hardware
- Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). 347-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.