The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWSEC"( http://dblp.L3S.de/Venues/IWSEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iwsec

Publication years (Num. hits)
2006 (31) 2007 (31) 2008 (20) 2009 (15) 2010 (25) 2011 (15) 2012 (17) 2013 (21) 2014 (22) 2015 (22) 2016 (20) 2017 (15) 2018 (21) 2019 (24) 2020 (17) 2021 (15) 2022-2023 (28)
Publication types (Num. hits)
inproceedings(341) proceedings(18)
Venues (Conferences, Journals, ...)
IWSEC(359)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 107 occurrences of 90 keywords

Results
Found 359 publication records. Showing 359 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Laurane Marco, Abdullah Talayhan, Serge Vaudenay Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hiroki Furue, Yasuhiko Ikematsu A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati, Stefano Zanero The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Max Cartor, Ryann Cartor, Mark Lewis, Daniel Smith-Tone Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Bénédikt Tran, Serge Vaudenay Extractable Witness Encryption for the Homogeneous Linear Equations Problem. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphael R. Toledo aPlonK: Aggregated PlonK from Multi-polynomial Commitment Schemes. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Junji Shikata, Hiroki Kuzuno (eds.) Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jiahao Zhao, Nana Zhang, Qianqian Yang 0003, Ling Song 0001, Lei Hu Improved Boomerang Attacks on Deoxys-BC. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vincent Giraud, David Naccache Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Koji Nuida Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Julien Béguinot, Wei Cheng 0003, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry Reliability of Ring Oscillator PUFs with Reduced Helper Data. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hyeonbum Lee, Jae Hong Seo TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Samuel Hand, Alexander Koch 0001, Pascal Lafourcade 0001, Daiki Miyahara, Léo Robert Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. Search on Bibsonomy IWSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Edoardo Persichetti, Tovohery Randrianarisoa On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hirotomo Shinoki, Koji Nuida On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nariyasu Heseri, Koji Nuida Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hiroki Kuzuno, Toshihiro Yamauchi KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sihao Shen, Zhenzhen Li, Wei Song 0002 Methods of Extracting Parameters of the Processor Caches. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chen-Mou Cheng, Mitsuaki Akiyama (eds.) Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Takanori Daiza, Kazuki Yoneyama Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, Takaaki Mizuki Card-Based Secure Sorting Protocol. Search on Bibsonomy IWSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Changze Yin, Yacheng Wang, Tsuyoshi Takagi (Short Paper) Simple Matrix Signature Scheme. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yasuhiko Ikematsu, Satoshi Nakamura 0004, Masaya Yasuda A Trace Map Attack Against Special Ring-LWE Samples. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yasufumi Hashimoto Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Takanori Daiza, Kaoru Kurosawa Optimum Attack on 3-Round Feistel-2 Structure. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Masahiro Masuda, Yukiyoshi Kameyama FFT Program Generation for Ring LWE-Based Cryptography. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hiroki Kuzuno, Toshihiro Yamauchi KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Koji Hamasaki, Hitoshi Hohjo Moving Target Defense for the CloudControl Game. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Ryo Nojima (eds.) Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jason T. LeGrow, Aaron Hutchinson (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini An Intermediate Secret-Guessing Attack on Hash-Based Signatures. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba 0001, Mitsuaki Akiyama, Masayuki Murata 0001 Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. Search on Bibsonomy IWSEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yui Tajiri, Mamoru Mimura Detection of Malicious PowerShell Using Word-Level Language Models. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sergii Banin, Geir Olav Dyrkolbotn Detection of Running Malware Before it Becomes Malicious. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kota Sasaki, Koji Nuida Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hailun Yan, Serge Vaudenay Symmetric Asynchronous Ratcheted Communication with Associated Data. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yoshitatsu Matsuda Optimization of Search Space for Finding Very Short Lattice Vectors. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada Model Extraction Oriented Data Publishing with k-anonymity. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Serge Fehr, Serge Vaudenay Sublinear Bounds on the Distinguishing Advantage for Multiple Samples. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rafael Kurek Efficient Forward-Secure Threshold Signatures. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Akira Kanaoka (eds.) Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Yu Sasaki, Siang Meng Sim On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuichiro Dan, Toshiki Shibahara, Junko Takahashi Timing Attack on Random Forests for Generating Adversarial Examples. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hiroshi Onuki, Tsuyoshi Takagi On Collisions Related to an Ideal Class of Order 3 in CSIDH. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hiroki Kuzuno, Toshihiro Yamauchi MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Takeshi Sugawara 0001, Tatsuya Onuma, Yang Li 0001 (Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kai Kinoshita, Koutarou Suzuki Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Atsushi Waseda, Ryo Nojima On Limitation of Plausible Deniability. Search on Bibsonomy IWSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abigail Koay, Ian Welch, Winston K. G. Seah (Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu A New Approach to Constructing Digital Signature Schemes - (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sergii Banin, Geir Olav Dyrkolbotn Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Toi Tomita, Wakaha Ogata, Kaoru Kurosawa CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Takeshi Yagi (eds.) Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Evangelos Mantas, Constantinos Patsakis GRYPHON: Drone Forensics in Dataflash and Telemetry Logs. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami How to Solve Multiple Short-Exponent Discrete Logarithm Problem. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ryo Okishima, Toru Nakanishi 0001 An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fukang Liu, Takanori Isobe 0001 Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001 Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Kirill Morozov VSS Made Simpler. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fukang Liu, Zhenfu Cao, Gaoli Wang Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jean-Guillaume Dumas, Pascal Lafourcade 0001, Julio López Fenner, David Lucas 0001, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xin Wang, Shimin Li, Rui Xue 0001 Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann API Usability of Stateful Signature Schemes. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi (Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura IDS Alert Priority Determination Based on Traffic Behavior. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1F. Betül Durak, Serge Vaudenay Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Takuma Ito, Naoyuki Shinohara, Shigenori Uchiyama An Efficient F_4 -style Based Algorithm to Solve MQ Problems. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Taro Ohminami Towards Efficient Detection of Malicious VBA Macros with LSI. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Yuki Funabiki, Takanori Isobe 0001 More Results on Shortest Linear Programs. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi (Short Paper) Method for Preventing Suspicious Web Access in Android WebView. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard Toward the Analysis of Distributed Code Injection in Post-mortem Forensics. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. Search on Bibsonomy IWSEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang 0001 Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cheng Shi, Kazuki Yoneyama Verification of LINE Encryption Version 1.0 Using ProVerif. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andreas Wiemers, Dominik Klein 0001 Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hayato Tada, Akinaga Ueda, Kaoru Kurosawa How to Prove KDM Security of BHHO. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qiuping Li, Baofeng Wu, Zhuojun Liu Lightweight Recursive MDS Matrices with Generalized Feistel Network. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen Qian 0002, Mehdi Tibouchi, Rémi Géraud Universal Witness Signatures. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada Detecting Privacy Information Abuse by Android Apps from API Call Logs. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pauline Bert, Adeline Roux-Langlois From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Akinaga Ueda, Hayato Tada, Kaoru Kurosawa (Short Paper) How to Solve DLOG Problem with Auxiliary Input. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Koji Shima, Hiroshi Doi XOR-Based Hierarchical Secret Sharing Scheme. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Makoto Iguchi, Taro Uematsu, Tatsuro Fujii The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Atsuo Inomata, Kan Yasuda (eds.) Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki (Short Paper) Parameter Trade-Offs for NFS and ECM. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 359 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license