


default search action
10. IWSEC 2015: Nara, Japan
- Keisuke Tanaka, Yuji Suga:

Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings. Lecture Notes in Computer Science 9241, Springer 2015, ISBN 978-3-319-22424-4
Identity-Based Encryption
- Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue

, Xiaochao Sun:
Identity-Based Lossy Encryption from Learning with Errors. 3-20 - Jae Hong Seo

, Keita Emura
:
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption. 21-38
Elliptic Curve Cryptography
- Taechan Kim

, Mehdi Tibouchi
:
Invalid Curve Attacks in a GLS Setting. 41-55 - Wei Yu, Kwang Ho Kim, Myong Song Jo:

New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates. 56-64
Factoring
- Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu:

Implicit Factorization of RSA Moduli Revisited (Short Paper). 67-76
Symmetric Cryptanalysis
- Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. 79-96 - Siwei Sun, Lei Hu, Kexin Qiao

, Xiaoshuang Ma, Jinyong Shan
, Ling Song:
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. 97-111
Provable Security
- Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani:

NM-CPA Secure Encryption with Proofs of Plaintext Knowledge. 115-134 - Shunsuke Taketani, Wakaha Ogata:

Improvement of UC Secure Searchable Symmetric Encryption Scheme. 135-152 - Tingting Zhang, Hongda Li:

Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. 153-172
LWE-Based Encryption
- Fuqun Wang, Kunpeng Wang, Bao Li:

LWE-Based FHE with Better Parameters. 175-192 - Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun:

Improved Efficiency of MP12. 193-210
Secret Sharing
- Hidetaka Hoshino, Satoshi Obana:

Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings. 213-222
Privacy-Preserving and Anonymity
- Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi:

k-Anonymous Microdata Release via Post Randomisation Method. 225-241 - Tadanori Teruya

, Koji Nuida
, Kana Shimizu
, Goichiro Hanaoka
:
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data. 242-261 - Shahidatul Sadiah, Toru Nakanishi, Nobuo Funabiki:

Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes. 262-278
Secure Protocol
- Kazumasa Shinagawa, Takaaki Mizuki

, Jacob C. N. Schuldt, Koji Nuida
, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. 281-297
Systems Security
- Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue:

An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks. 301-315 - Tong Liu, Yazhe Wang:

Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data. 316-334 - Reina Yagasaki, Kazuo Sakiyama:

Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). 335-344
Security in Hardware
- Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:

Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). 347-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














