default search action
8. IWSEC 2013: Okinawa, Japan
- Kazuo Sakiyama, Masayuki Terada:
Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings. Lecture Notes in Computer Science 8231, Springer 2013, ISBN 978-3-642-41382-7
Software and System Security
- Masaya Sato, Toshihiro Yamauchi:
Secure Log Transfer by Replacing a Library in a Virtual Machine. 1-18 - Yi Deng, Yang Zhang, Liang Cheng, Xiaoshan Sun:
Static Integer Overflow Vulnerability Detection in Windows Binary. 19-35 - Shotaro Sano, Takuma Otsuka, Hiroshi G. Okuno:
Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition. 36-52 - José Moreira, Marcel Fernandez, Grigory Kabatiansky:
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces. 53-67
Cryptanalysis
- Mostafa M. I. Taha, Patrick Schaumont:
Differential Power Analysis of MAC-Keccak at Any Key-Length. 68-82 - Yusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda:
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. 83-98 - Yosuke Todo, Yu Sasaki:
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. 99-114 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
Improvement of Faugère et al.'s Method to Solve ECDLP. 115-132
Privacy and Cloud Computing
- Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Paul Lin:
Statistics on Encrypted Cloud Data. 133-150 - Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo:
Toward Practical Searchable Symmetric Encryption. 151-167 - Paolo Palmieri, Olivier Pereira:
Unconditionally Secure Oblivious Transfer from Real Network Behavior. 168-182 - Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda:
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption. 183-200
Public Key Cryptosystems
- Yutaro Kiyomura, Tsuyoshi Takagi:
Efficient Algorithm for Tate Pairing of Composite Order. 201-216 - Kaoru Kurosawa, Takuma Ueda:
How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$. 217-225 - Takahiro Matsuda, Goichiro Hanaoka:
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption. 226-243 - Yasufumi Hashimoto:
Cryptanalysis of the Quaternion Rainbow. 244-257
Security Protocols
- Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. 258-271 - Kazuki Yoneyama:
One-Round Authenticated Key Exchange without Implementation Trick. 272-289 - Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka:
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011. 290-302 - Haruna Higo, Keisuke Tanaka, Kenji Yasunaga:
Game-Theoretic Security for Bit Commitment. 303-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.