×

Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. (English) Zbl 1346.68017

Lecture Notes in Computer Science 9241. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). xiii, 357 p. (2015).

Show indexed articles as search result.

The articles of mathematical interest will be reviewed individually. For the preceding workshop see [Zbl 1312.68014].
Indexed articles:
He, Jingnan; Li, Bao; Lu, Xianhui; Jia, Dingding; Xue, Haiyang; Sun, Xiaochao, Identity-based lossy encryption from learning with errors, 3-20 [Zbl 1398.68136]
Seo, Jae Hong; Emura, Keita, Adaptive-ID secure revocable hierarchical identity-based encryption, 21-38 [Zbl 1398.68144]
Kim, Taechan; Tibouchi, Mehdi, Invalid curve attacks in a GLS setting, 41-55 [Zbl 1398.94127]
Yu, Wei; Kim, Kwang Ho; Jo, Myong Song, New fast algorithms for elliptic curve arithmetic in affine coordinates, 56-64 [Zbl 1398.11158]
Peng, Liqiang; Hu, Lei; Lu, Yao; Huang, Zhangjie; Xu, Jun, Implicit factorization of RSA moduli revisited (short paper), 67-76 [Zbl 1398.94150]
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian, Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions, 79-96 [Zbl 1398.94140]
Sun, Siwei; Hu, Lei; Qiao, Kexin; Ma, Xiaoshuang; Shan, Jinyong; Song, Ling, Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s, 97-111 [Zbl 1398.94167]
Smyth, Ben; Hanatani, Yoshikazu; Muratani, Hirofumi, NM-CPA secure encryption with proofs of plaintext knowledge, 115-134 [Zbl 1398.68146]
Taketani, Shunsuke; Ogata, Wakaha, Improvement of UC secure searchable symmetric encryption scheme, 135-152 [Zbl 1398.68147]
Zhang, Tingting; Li, Hongda, Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model, 153-172 [Zbl 1398.94186]
Wang, Fuqun; Wang, Kunpeng; Li, Bao, LWE-based FHE with better parameters, 175-192 [Zbl 1398.68149]
Fang, Fuyang; Li, Bao; Lu, Xianhui; Sun, Xiaochao, Improved efficiency of MP12, 193-210 [Zbl 1398.94113]
Hoshino, Hidetaka; Obana, Satoshi, Almost optimum secret sharing schemes with cheating detection for random bit strings, 213-222 [Zbl 1398.94196]
Ikarashi, Dai; Kikuchi, Ryo; Chida, Koji; Takahashi, Katsumi, \(k\)-anonymous microdata release via post randomisation method, 225-241 [Zbl 1398.68138]
Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro, On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data, 242-261 [Zbl 1398.68148]
Sadiah, Shahidatul; Nakanishi, Toru; Funabiki, Nobuo, Anonymous credential system with efficient proofs for monotone formulas on attributes, 262-278 [Zbl 1398.94203]
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji, Secure multi-party computation using polarizing cards, 281-297 [Zbl 1398.68145]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1312.68014
PDFBibTeX XMLCite
Full Text: DOI