


default search action
7. IWSEC 2012: Fukuoka, Japan
- Goichiro Hanaoka, Toshihiro Yamauchi:

Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Lecture Notes in Computer Science 7631, Springer 2012, ISBN 978-3-642-34116-8
Implementation
- Yiming Jing, Gail-Joon Ahn

, Hongxin Hu:
Model-Based Conformance Testing for Android. 1-18 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:

Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. 19-36 - Chien-Ning Chen, Nisha Jacob

, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang:
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU. 37-50 - Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe:

Very Short Critical Path Implementation of AES with Direct Logic Gates. 51-68
Encryption and Key Exchange
- Kazuki Yoneyama:

One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary. 69-86 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:

Compact Stateful Encryption Schemes with Ciphertext Verifiability. 87-104 - Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba:

Structured Encryption for Conceptual Graphs. 105-122 - Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka:

Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability. 123-137
Cryptanalysis
- Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:

Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. 138-155 - Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:

Boomerang Distinguishers for Full HAS-160 Compression Function. 156-169 - Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:

Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. 170-181 - Jingjing Wang, Kefei Chen, Shixiong Zhu:

Annihilators of Fast Discrete Fourier Spectra Attacks. 182-196 - Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque

:
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. 197-215
Secure Protocols
- Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:

Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. 216-232 - Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang:

Efficient Secure Primitive for Privacy Preserving Distributed Computations. 233-243 - Itsuki Suzuki, Maki Yoshida, Toru Fujiwara:

Generic Construction of GUC Secure Commitment in the KRK Model. 244-260

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














