Tanaka, Keisuke (ed.); Suga, Yuji (ed.) Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. (English) Zbl 1346.68017 Lecture Notes in Computer Science 9241. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). xiii, 357 p. (2015). Show indexed articles as search result. The articles of mathematical interest will be reviewed individually. For the preceding workshop see [Zbl 1312.68014].Indexed articles:He, Jingnan; Li, Bao; Lu, Xianhui; Jia, Dingding; Xue, Haiyang; Sun, Xiaochao, Identity-based lossy encryption from learning with errors, 3-20 [Zbl 1398.68136]Seo, Jae Hong; Emura, Keita, Adaptive-ID secure revocable hierarchical identity-based encryption, 21-38 [Zbl 1398.68144]Kim, Taechan; Tibouchi, Mehdi, Invalid curve attacks in a GLS setting, 41-55 [Zbl 1398.94127]Yu, Wei; Kim, Kwang Ho; Jo, Myong Song, New fast algorithms for elliptic curve arithmetic in affine coordinates, 56-64 [Zbl 1398.11158]Peng, Liqiang; Hu, Lei; Lu, Yao; Huang, Zhangjie; Xu, Jun, Implicit factorization of RSA moduli revisited (short paper), 67-76 [Zbl 1398.94150]Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian, Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions, 79-96 [Zbl 1398.94140]Sun, Siwei; Hu, Lei; Qiao, Kexin; Ma, Xiaoshuang; Shan, Jinyong; Song, Ling, Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s, 97-111 [Zbl 1398.94167]Smyth, Ben; Hanatani, Yoshikazu; Muratani, Hirofumi, NM-CPA secure encryption with proofs of plaintext knowledge, 115-134 [Zbl 1398.68146]Taketani, Shunsuke; Ogata, Wakaha, Improvement of UC secure searchable symmetric encryption scheme, 135-152 [Zbl 1398.68147]Zhang, Tingting; Li, Hongda, Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model, 153-172 [Zbl 1398.94186]Wang, Fuqun; Wang, Kunpeng; Li, Bao, LWE-based FHE with better parameters, 175-192 [Zbl 1398.68149]Fang, Fuyang; Li, Bao; Lu, Xianhui; Sun, Xiaochao, Improved efficiency of MP12, 193-210 [Zbl 1398.94113]Hoshino, Hidetaka; Obana, Satoshi, Almost optimum secret sharing schemes with cheating detection for random bit strings, 213-222 [Zbl 1398.94196]Ikarashi, Dai; Kikuchi, Ryo; Chida, Koji; Takahashi, Katsumi, \(k\)-anonymous microdata release via post randomisation method, 225-241 [Zbl 1398.68138]Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro, On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data, 242-261 [Zbl 1398.68148]Sadiah, Shahidatul; Nakanishi, Toru; Funabiki, Nobuo, Anonymous credential system with efficient proofs for monotone formulas on attributes, 262-278 [Zbl 1398.94203]Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji, Secure multi-party computation using polarizing cards, 281-297 [Zbl 1398.68145] Cited in 1 Review MSC: 68-06 Proceedings, conferences, collections, etc. pertaining to computer science 68P25 Data encryption (aspects in computer science) 94A60 Cryptography 94A62 Authentication, digital signatures and secret sharing 00B25 Proceedings of conferences of miscellaneous specific interest Citations:Zbl 1312.68014 PDFBibTeX XMLCite \textit{K. Tanaka} (ed.) and \textit{Y. Suga} (ed.), Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26--28, 2015. Proceedings. Cham: Springer (2015; Zbl 1346.68017) Full Text: DOI