


default search action
15th IWSEC 2020: Fukui, Japan
- Kazumaro Aoki, Akira Kanaoka:
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12231, Springer 2020, ISBN 978-3-030-58207-4
Symmetric-Key Cryptography 1
- Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. 3-22 - Yuta Kodera
, Yuki Taketa
, Takuya Kusaka
, Yasuyuki Nogami
, Satoshi Uehara
:
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. 23-36
Malicious Activity Detection 1
- Yui Tajiri, Mamoru Mimura
:
Detection of Malicious PowerShell Using Word-Level Language Models. 39-56 - Sergii Banin, Geir Olav Dyrkolbotn:
Detection of Running Malware Before it Becomes Malicious. 57-73
Multiparty Computation
- Kota Sasaki, Koji Nuida
:
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing. 77-94
Malicious Activity Detection 2
- Hiroki Kuzuno, Toshihiro Yamauchi
:
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. 97-116 - Takeshi Sugawara
, Tatsuya Onuma, Yang Li:
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. 117-127
Post Quantum Cryptography
- Hiroshi Onuki
, Tsuyoshi Takagi:
On Collisions Related to an Ideal Class of Order 3 in CSIDH. 131-148 - Yoshitatsu Matsuda:
Optimization of Search Space for Finding Very Short Lattice Vectors. 149-161
Symmetric-Key Cryptography 2
- Serge Fehr, Serge Vaudenay:
Sublinear Bounds on the Distinguishing Advantage for Multiple Samples. 165-183 - Hailun Yan, Serge Vaudenay:
Symmetric Asynchronous Ratcheted Communication with Associated Data. 184-204
Privacy
- Atsushi Waseda, Ryo Nojima:
On Limitation of Plausible Deniability. 207-217 - Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada:
Model Extraction Oriented Data Publishing with k-anonymity. 218-236
Pairing-Based Cryptography
- Rafael Kurek:
Efficient Forward-Secure Threshold Signatures. 239-260 - Kai Kinoshita, Koutarou Suzuki:
Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques. 261-281
Machine Learning
- Yuichiro Dan, Toshiki Shibahara, Junko Takahashi:
Timing Attack on Random Forests for Generating Adversarial Examples. 285-302

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.