Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi |
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Laurane Marco, Abdullah Talayhan, Serge Vaudenay |
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Furue, Yasuhiko Ikematsu |
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati, Stefano Zanero |
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Max Cartor, Ryann Cartor, Mark Lewis, Daniel Smith-Tone |
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Bénédikt Tran, Serge Vaudenay |
Extractable Witness Encryption for the Homogeneous Linear Equations Problem. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphael R. Toledo |
aPlonK: Aggregated PlonK from Multi-polynomial Commitment Schemes. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Junji Shikata, Hiroki Kuzuno (eds.) |
Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jiahao Zhao, Nana Zhang, Qianqian Yang 0003, Ling Song 0001, Lei Hu |
Improved Boomerang Attacks on Deoxys-BC. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Giraud, David Naccache |
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Koji Nuida |
Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata |
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Julien Béguinot, Wei Cheng 0003, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry |
Reliability of Ring Oscillator PUFs with Reduced Helper Data. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hyeonbum Lee, Jae Hong Seo |
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Hand, Alexander Koch 0001, Pascal Lafourcade 0001, Daiki Miyahara, Léo Robert |
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. |
IWSEC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi |
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi |
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Edoardo Persichetti, Tovohery Randrianarisoa |
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hirotomo Shinoki, Koji Nuida |
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo |
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda |
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Nariyasu Heseri, Koji Nuida |
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang |
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Sihao Shen, Zhenzhen Li, Wei Song 0002 |
Methods of Extracting Parameters of the Processor Caches. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chen-Mou Cheng, Mitsuaki Akiyama (eds.) |
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Daiza, Kazuki Yoneyama |
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, Takaaki Mizuki |
Card-Based Secure Sorting Protocol. |
IWSEC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Changze Yin, Yacheng Wang, Tsuyoshi Takagi |
(Short Paper) Simple Matrix Signature Scheme. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi |
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura |
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yasuhiko Ikematsu, Satoshi Nakamura 0004, Masaya Yasuda |
A Trace Map Attack Against Special Ring-LWE Samples. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yasufumi Hashimoto |
Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Daiza, Kaoru Kurosawa |
Optimum Attack on 3-Round Feistel-2 Structure. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Masuda, Yukiyoshi Kameyama |
FFT Program Generation for Ring LWE-Based Cryptography. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Koji Hamasaki, Hitoshi Hohjo |
Moving Target Defense for the CloudControl Game. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Ryo Nojima (eds.) |
Advances in Information and Computer Security - 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jason T. LeGrow, Aaron Hutchinson |
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi |
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini |
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki |
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba 0001, Mitsuaki Akiyama, Masayuki Murata 0001 |
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. |
IWSEC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yui Tajiri, Mamoru Mimura |
Detection of Malicious PowerShell Using Word-Level Language Models. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sergii Banin, Geir Olav Dyrkolbotn |
Detection of Running Malware Before it Becomes Malicious. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kota Sasaki, Koji Nuida |
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hailun Yan, Serge Vaudenay |
Symmetric Asynchronous Ratcheted Communication with Associated Data. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yoshitatsu Matsuda |
Optimization of Search Space for Finding Very Short Lattice Vectors. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada |
Model Extraction Oriented Data Publishing with k-anonymity. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Serge Vaudenay |
Sublinear Bounds on the Distinguishing Advantage for Multiple Samples. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Kurek |
Efficient Forward-Secure Threshold Signatures. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Akira Kanaoka (eds.) |
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Sarkar, Yu Sasaki, Siang Meng Sim |
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuichiro Dan, Toshiki Shibahara, Junko Takahashi |
Timing Attack on Random Forests for Generating Adversarial Examples. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Onuki, Tsuyoshi Takagi |
On Collisions Related to an Ideal Class of Order 3 in CSIDH. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Kuzuno, Toshihiro Yamauchi |
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Sugawara 0001, Tatsuya Onuma, Yang Li 0001 |
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara |
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kai Kinoshita, Koutarou Suzuki |
Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Waseda, Ryo Nojima |
On Limitation of Plausible Deniability. |
IWSEC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abigail Koay, Ian Welch, Winston K. G. Seah |
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu |
A New Approach to Constructing Digital Signature Schemes - (Short Paper). |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sergii Banin, Geir Olav Dyrkolbotn |
Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Toi Tomita, Wakaha Ogata, Kaoru Kurosawa |
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Takeshi Yagi (eds.) |
Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Evangelos Mantas, Constantinos Patsakis |
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami |
How to Solve Multiple Short-Exponent Discrete Logarithm Problem. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Okishima, Toru Nakanishi 0001 |
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fukang Liu, Takanori Isobe 0001 |
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001 |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Kirill Morozov |
VSS Made Simpler. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fukang Liu, Zhenfu Cao, Gaoli Wang |
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Guillaume Dumas, Pascal Lafourcade 0001, Julio López Fenner, David Lucas 0001, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys |
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xin Wang, Shimin Li, Rui Xue 0001 |
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann |
API Usability of Stateful Signature Schemes. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi |
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura |
IDS Alert Priority Determination Based on Traffic Behavior. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | F. Betül Durak, Serge Vaudenay |
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Ito, Naoyuki Shinohara, Shigenori Uchiyama |
An Efficient F_4 -style Based Algorithm to Solve MQ Problems. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mamoru Mimura, Taro Ohminami |
Towards Efficient Detection of Malicious VBA Macros with LSI. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Yuki Funabiki, Takanori Isobe 0001 |
More Results on Shortest Linear Programs. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi |
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard |
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura |
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. |
IWSEC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang 0001 |
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi |
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Shi, Kazuki Yoneyama |
Verification of LINE Encryption Version 1.0 Using ProVerif. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Wiemers, Dominik Klein 0001 |
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Tada, Akinaga Ueda, Kaoru Kurosawa |
How to Prove KDM Security of BHHO. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Qiuping Li, Baofeng Wu, Zhuojun Liu |
Lightweight Recursive MDS Matrices with Generalized Feistel Network. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chen Qian 0002, Mehdi Tibouchi, Rémi Géraud |
Universal Witness Signatures. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada |
Detecting Privacy Information Abuse by Android Apps from API Call Logs. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pauline Bert, Adeline Roux-Langlois |
From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Akinaga Ueda, Hayato Tada, Kaoru Kurosawa |
(Short Paper) How to Solve DLOG Problem with Auxiliary Input. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Koji Shima, Hiroshi Doi |
XOR-Based Hierarchical Secret Sharing Scheme. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki |
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Iguchi, Taro Uematsu, Tatsuro Fujii |
The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Atsuo Inomata, Kan Yasuda (eds.) |
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki |
(Short Paper) Parameter Trade-Offs for NFS and ECM. |
IWSEC |
2018 |
DBLP DOI BibTeX RDF |
|