default search action
19th IWSEC 2024: Kyoto, Japan
- Kazuhiko Minematsu, Mamoru Mimura:
Advances in Information and Computer Security - 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14977, Springer 2024, ISBN 978-981-97-7736-5
Authenticated Encryption
- Takuro Shiraya, Kosei Sakamoto, Takanori Isobe:
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes. 3-22 - Alexander Bille, Elmar Tischhauser:
Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. 23-42
Symmetric-key Cryptanalysis
- Eik List:
Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES. 45-64 - Bungo Taga, Norimitsu Ito, Takako Okano:
Weak Keys of the Full MISTY1 Recovered in Practical Time. 65-81
Protocols
- Yoshiaki Honda, Kazumasa Shinagawa:
Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. 85-100 - Anushree Belel, Ratna Dutta:
Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. 101-121
Analysis of Public-key Cryptosystems
- Vincent Hwang:
Formal Verification of Emulated Floating-Point Arithmetic in Falcon. 125-141 - Arata Sato, Aurélien Auzemery, Akira Katayama, Masaya Yasuda:
Experimental Analysis of Integer Factorization Methods Using Lattices. 142-157 - Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi:
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. 158-176
Vulnerability
- Rin Miyachi, Konan Nagashima, Taiichi Saito:
Race Condition Vulnerabilities in WordPress Plug-ins. 179-194 - Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti:
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study. 195-210
Malware Countermeasure
- Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Piotr Pawlowski, Pawel Morawiecki, Jaroslaw Duda, Josef Pieprzyk:
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. 213-233 - Nobuyuki Sugio, Hokuto Ito:
Implementation for Malicious Software Using ChatGPT-4. 234-243 - Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh, Tansu Alpcan:
A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. 244-254
Network Security and Privacy
- Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui:
Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. 257-276 - Jaiden Fairoze, Peitong Duan:
Information Leakage Through Packet Lengths in RTC Traffic. 277-296 - Kabuto Okajima, Koji Chida:
A Study on Anonymization Through Participation in iPWS Cup 2023. 297-306
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.