


default search action
4. IWSEC 2009: Toyama, Japan
- Tsuyoshi Takagi, Masahiro Mambo:

Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings. Lecture Notes in Computer Science 5824, Springer 2009, ISBN 978-3-642-04845-6
Invited Talk
- Bart Preneel

:
The Future of Cryptographic Algorithms. 1-2
Block Cipher
- Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:

Bit-Free Collision: Application to APOP Attack. 3-21 - Jiali Choy, Huihui Yap:

Impossible Boomerang Attack for Block Cipher Structures. 22-37 - Gautham Sekar, Bart Preneel

:
Improved Distinguishing Attacks on HC-256. 38-52
Cryptographic Protocols
- Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura

:
A Generic Construction of Timed-Release Encryption with Pre-open Capability. 53-70 - S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan:

An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. 71-88 - Pairat Thorncharoensri

, Willy Susilo
, Yi Mu:
Universal Designated Verifier Signatures with Threshold-Signers. 89-109 - Kai-Yuen Cheong, Takeshi Koshiba

:
Reducing Complexity Assumptions for Oblivious Transfer. 110-124
Contents Protection and Intrusion Detection
- Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan:

Tamper-Tolerant Software: Modeling and Implementation. 125-139 - Koji Nuida

:
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. 140-157 - Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren:

Efficient Intrusion Detection Based on Static Analysis and Stack Walks. 158-173
Authentication
- Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu

:
Strongly Secure Authenticated Key Exchange without NAXOS' Approach. 174-191 - Xun Yi

, Raylin Tso
, Eiji Okamoto:
ID-Based Group Password-Authenticated Key Exchange. 192-211 - Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata

, Hiroaki Kikuchi, Masakatsu Nishigaki
:
A Proposal of Efficient Remote Biometric Authentication Protocol. 212-227

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














