


default search action
12th IWSEC 2017: Hiroshima, Japan
- Satoshi Obana, Koji Chida:

Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10418, Springer 2017, ISBN 978-3-319-64199-7
Post-quantum Cryptography
- Akinori Hosoyamada

, Kazumaro Aoki:
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. 3-18 - Saed Alsayigh

, Jintai Ding
, Tsuyoshi Takagi, Yuntao Wang
:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. 19-35
System Security (1)
- Ahto Buldas

, Aleksandr Lenin
, Jan Willemson, Anton Charnamord:
Simple Infeasibility Certificates for Attack Trees. 39-55 - Bingqing Xia, Dongyao Ji, Gang Yao:

Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper). 56-66
Public Key Cryptosystems (1)
- Rui Zhang, Kai He:

Multipurpose Public-Key Encryption. 69-84 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu

, Tarunpreet Bhatia, Olivier Markowitch:
Secure Certificateless Proxy Re-encryption Without Pairing. 85-101
System Security (2)
- Nasser Mohammed Al-Fannah, Wanpeng Li

:
Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability. 105-120 - Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:

Evasion Attacks Against Statistical Code Obfuscation Detectors. 121-137
Cryptanalysis
- Kota Kondo, Yu Sasaki, Yosuke Todo

, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. 141-158 - Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman

, Shinsaku Kiyomoto:
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. 159-178
Cryptographic Protocols
- Baptiste Vinh Mau, Koji Nuida

:
Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper). 181-191 - Atsushi Fujioka:

Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. 192-211
Public Key Cryptosystems (2)
- Daode Zhang, Fuyang Fang, Bao Li, Xin Wang:

Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters. 215-230 - Haiyang Xue

, Bao Li, Xianhui Lu:
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). 231-241

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














