default search action
14th IWSEC 2019: Tokyo, Japan
- Nuttapong Attrapadung, Takeshi Yagi:
Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings. Lecture Notes in Computer Science 11689, Springer 2019, ISBN 978-3-030-26833-6
Public-Key Primitives 1
- Toi Tomita, Wakaha Ogata, Kaoru Kurosawa:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. 3-22 - Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. 23-33
Cryptanalysis on Public-Key Primitives
- Takuma Ito, Naoyuki Shinohara, Shigenori Uchiyama:
An Efficient F_4 -style Based Algorithm to Solve MQ Problems. 37-52 - Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami:
How to Solve Multiple Short-Exponent Discrete Logarithm Problem. 53-64
Cryptographic Protocols 1
- Jean-Guillaume Dumas, Pascal Lafourcade, Julio López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys:
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. 67-88 - Ryo Okishima, Toru Nakanishi:
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. 89-106
Symmetric-Key Primitives
- Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More Results on Shortest Linear Programs. 109-128 - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. 129-145
Malware Detection and Classification
- Sergii Banin, Geir Olav Dyrkolbotn:
Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification. 149-167 - Mamoru Mimura, Taro Ohminami:
Towards Efficient Detection of Malicious VBA Macros with LSI. 168-185
Intrusion Detection and Prevention
- Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura:
IDS Alert Priority Determination Based on Traffic Behavior. 189-206 - Abigail M. Y. Koay, Ian Welch, Winston K. G. Seah:
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection. 207-217
Web and Usable Security
- Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann:
API Usability of Stateful Signature Schemes. 221-240 - Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi:
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView. 241-250
Public-Key Primitives 2
- Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. 253-272 - Xin Wang, Shimin Li, Rui Xue:
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). 273-283
Cryptanalysis on Symmetric-Key Primitives
- Fukang Liu, Zhenfu Cao, Gaoli Wang:
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. 287-305 - Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. 306-326
Cryptographic Protocols 2
- Yvo Desmedt, Kirill Morozov:
VSS Made Simpler. 329-342 - F. Betül Durak, Serge Vaudenay:
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity. 343-362 - Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu:
A New Approach to Constructing Digital Signature Schemes - (Short Paper). 363-373
Forensics
- Evangelos Mantas, Constantinos Patsakis:
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs. 377-390 - Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard:
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics. 391-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.