Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/AkagiN14,
  author       = {Shoichi Akagi and
                  Yasuyuki Nogami},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Exponentiation Inversion Problem Reduced from Fixed Argument Pairing
                  Inversion on Twistable Ate Pairing and Its Difficulty},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {240--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_18},
  doi          = {10.1007/978-3-319-09843-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AkagiN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BayHV14,
  author       = {Asl{\'{\i}} Bay and
                  Jialin Huang and
                  Serge Vaudenay},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Improved Linear Cryptanalysis of Reduced-Round {MIBS}},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {204--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_16},
  doi          = {10.1007/978-3-319-09843-2\_16},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BayHV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChangHHYWC14,
  author       = {Yun{-}An Chang and
                  Wei{-}Chih Hong and
                  Ming{-}Chun Hsiao and
                  Bo{-}Yin Yang and
                  An{-}Yeu Wu and
                  Chen{-}Mou Cheng},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor
                  Supporting Elliptic-Curve Pairings over Fields of Large Characteristics},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_14},
  doi          = {10.1007/978-3-319-09843-2\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChangHHYWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChatterjeeM14,
  author       = {Sanjit Chatterjee and
                  Sayantan Mukherjee},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Framework for Efficient Search and Statistics Computation on Encrypted
                  Cloud Data},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {276--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_21},
  doi          = {10.1007/978-3-319-09843-2\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChatterjeeM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DattaN14,
  author       = {Nilanjan Datta and
                  Mridul Nandi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Characterization of {EME} with Linear Mixing},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {221--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_17},
  doi          = {10.1007/978-3-319-09843-2\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/DattaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DuttaP14,
  author       = {Avijit Dutta and
                  Goutam Paul},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Deterministic Hard Fault Attack on Trivium},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_11},
  doi          = {10.1007/978-3-319-09843-2\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DuttaP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EndoK14,
  author       = {Kosei Endo and
                  Noboru Kunihiro},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {On the Security Proof of an Authentication Protocol from Eurocrypt
                  2011},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_15},
  doi          = {10.1007/978-3-319-09843-2\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EndoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EvciK14,
  author       = {Muhammet Ali Evci and
                  Sel{\c{c}}uk Kavut},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {{DPA} Resilience of Rotation-Symmetric S-boxes},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_12},
  doi          = {10.1007/978-3-319-09843-2\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EvciK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HajnyMT14,
  author       = {Jan Hajny and
                  Lukas Malina and
                  Ondrej Tethal},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Privacy-Friendly Access Control Based on Personal Attributes},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_1},
  doi          = {10.1007/978-3-319-09843-2\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HajnyMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JiaLLM14,
  author       = {Dingding Jia and
                  Bao Li and
                  Xianhui Lu and
                  Qixiang Mei},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Related Key Secure {PKE} from Hash Proof Systems},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {250--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_19},
  doi          = {10.1007/978-3-319-09843-2\_19},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JiaLLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KrotofilL14,
  author       = {Marina Krotofil and
                  Jason Larsen},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Are You Threatening My Hazards?},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_2},
  doi          = {10.1007/978-3-319-09843-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KrotofilL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ObanaT14,
  author       = {Satoshi Obana and
                  Kazuya Tsuchida},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary
                  Finite Field},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {88--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_7},
  doi          = {10.1007/978-3-319-09843-2\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Ohata0HM14,
  author       = {Satsuya Ohata and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {More Constructions of Re-splittable Threshold Public Key Encryption},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {109--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_9},
  doi          = {10.1007/978-3-319-09843-2\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Ohata0HM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PalmieriP14,
  author       = {Paolo Palmieri and
                  Johan A. Pouwelse},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Key Management for Onion Routing in a True Peer to Peer Setting},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {62--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_5},
  doi          = {10.1007/978-3-319-09843-2\_5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PalmieriP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY14,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Complicating Process Identification by Replacing Process Information
                  for Attack Avoidance},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_3},
  doi          = {10.1007/978-3-319-09843-2\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzakiYKI14,
  author       = {Kuniyasu Suzaki and
                  Toshiki Yagi and
                  Kazukuni Kobara and
                  Toshiaki Ishiyama},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Kernel Memory Protection by an Insertable Hypervisor Which Has {VM}
                  Introspection and Stealth Breakpoints},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {48--61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_4},
  doi          = {10.1007/978-3-319-09843-2\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzakiYKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiY14,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Secure Multi-Party Computation for Elliptic Curves},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {98--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_8},
  doi          = {10.1007/978-3-319-09843-2\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TsengCL14,
  author       = {Fu{-}Kuo Tseng and
                  Rong{-}Jaye Chen and
                  Bao{-}Shuh Paul Lin},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Towards Symmetric Functional Encryption for Regular Languages with
                  Predicate Privacy},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_20},
  doi          = {10.1007/978-3-319-09843-2\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TsengCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT14,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_6},
  doi          = {10.1007/978-3-319-09843-2\_6},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YamamotoTST14,
  author       = {Dai Yamamoto and
                  Masahiko Takenaka and
                  Kazuo Sakiyama and
                  Naoya Torii},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {A Technique Using PUFs for Protecting Circuit Layout Designs against
                  Reverse Engineering},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_13},
  doi          = {10.1007/978-3-319-09843-2\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Zhang14,
  author       = {Hailong Zhang},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {How to Effectively Decrease the Resource Requirement in Template Attack?},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_10},
  doi          = {10.1007/978-3-319-09843-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2014,
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2},
  doi          = {10.1007/978-3-319-09843-2},
  isbn         = {978-3-319-09842-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics