Login / Signup
IWSEC
2006
2012
2016
2023
2006
2023
Keyphrases
Publications
2023
Bénédikt Tran
,
Serge Vaudenay
Extractable Witness Encryption for the Homogeneous Linear Equations Problem.
IWSEC
(2023)
Hiroki Furue
,
Yasuhiko Ikematsu
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack.
IWSEC
(2023)
Miguel Ambrona
,
Marc Beunardeau
,
Anne-Laure Schmitt
,
Raphael R. Toledo
from Multi-polynomial Commitment Schemes.
IWSEC
(2023)
Koji Nuida
Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding.
IWSEC
(2023)
Vincent Giraud
,
David Naccache
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges.
IWSEC
(2023)
Haiming Zhu
,
Shoichi Kamada
,
Momonari Kudo
,
Tsuyoshi Takagi
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors.
IWSEC
(2023)
Laurane Marco
,
Abdullah Talayhan
,
Serge Vaudenay
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger.
IWSEC
(2023)
Jiahao Zhao
,
Nana Zhang
,
Qianqian Yang
,
Ling Song
,
Lei Hu
Improved Boomerang Attacks on Deoxys-BC.
IWSEC
(2023)
Samuel Hand
,
Alexander Koch
,
Pascal Lafourcade
,
Daiki Miyahara
,
Léo Robert
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
IWSEC
(2023)
Julien Béguinot
,
Wei Cheng
,
Jean-Luc Danger
,
Sylvain Guilley
,
Olivier Rioul
,
Ville Yli-Mäyry
Reliability of Ring Oscillator PUFs with Reduced Helper Data.
IWSEC
(2023)
Max Cartor
,
Ryann Cartor
,
Mark Lewis
,
Daniel Smith-Tone
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.
IWSEC
(2023)
Isamu Furuya
,
Hayato Kasahara
,
Akiko Inoue
,
Kazuhiko Minematsu
,
Tetsu Iwata
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security.
IWSEC
(2023)
Hyeonbum Lee
,
Jae Hong Seo
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup.
IWSEC
(2023)
Riccardo Remigio
,
Alessandro Bertani
,
Mario Polino
,
Michele Carminati
,
Stefano Zanero
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
IWSEC
(2023)
volume 14128, 2023
Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings
IWSEC
14128 (2023)
2022
Sihao Shen
,
Zhenzhen Li
,
Wei Song
Methods of Extracting Parameters of the Processor Caches.
IWSEC
(2022)
Rikuo Haga
,
Kodai Toyoda
,
Yuto Shinoda
,
Daiki Miyahara
,
Kazumasa Shinagawa
,
Yu-ichi Hayashi
,
Takaaki Mizuki
Card-Based Secure Sorting Protocol.
IWSEC
(2022)
Hanno Becker
,
Vincent Hwang
,
Matthias J. Kannwischer
,
Lorenz Panny
,
Bo-Yin Yang
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms.
IWSEC
(2022)
Nariyasu Heseri
,
Koji Nuida
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols.
IWSEC
(2022)
Takanori Daiza
,
Kazuki Yoneyama
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles.
IWSEC
(2022)
Hiroki Kuzuno
,
Toshihiro Yamauchi
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key.
IWSEC
(2022)
Hirotomo Shinoki
,
Koji Nuida
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption.
IWSEC
(2022)
Jing-Shiuan You
,
Zi-Yuan Liu
,
Raylin Tso
,
Yi-Fan Tseng
,
Masahiro Mambo
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices.
IWSEC
(2022)
Taku Kato
,
Yutaro Kiyomura
,
Tsuyoshi Takagi
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values.
IWSEC
(2022)
Ferdinand Sibleyras
,
Yu Sasaki
,
Yosuke Todo
,
Akinori Hosoyamada
,
Kan Yasuda
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
IWSEC
(2022)
Edoardo Persichetti
,
Tovohery Randrianarisoa
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography.
IWSEC
(2022)
Shota Fujii
,
Nobutaka Kawaguchi
,
Tomohiro Shigemoto
,
Toshihiro Yamauchi
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.
IWSEC
(2022)
volume 13504, 2022
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings
IWSEC
13504 (2022)
2021
Koji Hamasaki
,
Hitoshi Hohjo
Moving Target Defense for the CloudControl Game.
IWSEC
(2021)
Jason T. LeGrow
,
Aaron Hutchinson
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.
IWSEC
(2021)
Masahiro Masuda
,
Yukiyoshi Kameyama
FFT Program Generation for Ring LWE-Based Cryptography.
IWSEC
(2021)
Hiroki Kuzuno
,
Toshihiro Yamauchi
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.
IWSEC
(2021)
Takanori Daiza
,
Kaoru Kurosawa
Optimum Attack on 3-Round Feistel-2 Structure.
IWSEC
(2021)
Yasuhiko Ikematsu
,
Satoshi Nakamura
,
Masaya Yasuda
A Trace Map Attack Against Special Ring-LWE Samples.
IWSEC
(2021)
Hisaaki Yamaba
,
Ahmad Saiful Aqmal Bin Ahmad Sohaimi
,
Shotaro Usuzaki
,
Kentaro Aburada
,
Masayuki Mukunoki
,
Mirang Park
,
Naonobu Okazaki
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.
IWSEC
(2021)
Yasufumi Hashimoto
Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices.
IWSEC
(2021)
Roland Booth
,
Yanhong Xu
,
Sabyasachi Karati
,
Reihaneh Safavi-Naini
An Intermediate Secret-Guessing Attack on Hash-Based Signatures.
IWSEC
(2021)
Shusaku Uemura
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
,
Momonari Kudo
,
Tsuyoshi Takagi
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.
IWSEC
(2021)
Changze Yin
,
Yacheng Wang
,
Tsuyoshi Takagi
(Short Paper) Simple Matrix Signature Scheme.
IWSEC
(2021)
Toru Nakamura
,
Hiroshi Ito
,
Shinsaku Kiyomoto
,
Toshihiro Yamauchi
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
IWSEC
(2021)
Kittiphop Phalakarn
,
Vorapong Suppakitpaisarn
,
Nuttapong Attrapadung
,
Kanta Matsuura
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.
IWSEC
(2021)
Yun Fan
,
Toshiki Shibahara
,
Yuichi Ohsita
,
Daiki Chiba
,
Mitsuaki Akiyama
,
Masayuki Murata
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.
IWSEC
(2021)
volume 12835, 2021
Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings
IWSEC
12835 (2021)
2020
Yuichiro Dan
,
Toshiki Shibahara
,
Junko Takahashi
Timing Attack on Random Forests for Generating Adversarial Examples.
IWSEC
(2020)
Rafael Kurek
Efficient Forward-Secure Threshold Signatures.
IWSEC
(2020)
Sumanta Sarkar
,
Yu Sasaki
,
Siang Meng Sim
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition.
IWSEC
(2020)
Takeru Fukuoka
,
Yuji Yamaoka
,
Takeaki Terada
Model Extraction Oriented Data Publishing with k-anonymity.
IWSEC
(2020)
Hailun Yan
,
Serge Vaudenay
Symmetric Asynchronous Ratcheted Communication with Associated Data.
IWSEC
(2020)
Yoshitatsu Matsuda
Optimization of Search Space for Finding Very Short Lattice Vectors.
IWSEC
(2020)
volume 12231, 2020
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings
IWSEC
12231 (2020)