Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2023.bht:"
@inproceedings{DBLP:conf/iwsec/AmbronaBST23, author = {Miguel Ambrona and Marc Beunardeau and Anne{-}Laure Schmitt and Raphael R. Toledo}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {a\emph{P}lon\emph{K}: Aggregated \emph{P}lon\emph{K} from Multi-polynomial Commitment Schemes}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {195--213}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_11}, doi = {10.1007/978-3-031-41326-1\_11}, timestamp = {Fri, 25 Aug 2023 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AmbronaBST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23, author = {Julien B{\'{e}}guinot and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul and Ville Yli{-}M{\"{a}}yry}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Reliability of Ring Oscillator PUFs with Reduced Helper Data}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {36--56}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_3}, doi = {10.1007/978-3-031-41326-1\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/CartorCLS23, author = {Max Cartor and Ryann Cartor and Mark Lewis and Daniel Smith{-}Tone}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {137--151}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_8}, doi = {10.1007/978-3-031-41326-1\_8}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/CartorCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FurueI23, author = {Hiroki Furue and Yasuhiko Ikematsu}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {A New Security Analysis Against {MAYO} and {QR-UOV} Using Rectangular MinRank Attack}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {101--116}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_6}, doi = {10.1007/978-3-031-41326-1\_6}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FurueI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FuruyaKIMI23, author = {Isamu Furuya and Hayato Kasahara and Akiko Inoue and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {PMACrx: {A} Vector-Input {MAC} for High-Dimensional Vectors with {BBB} Security}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {77--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_5}, doi = {10.1007/978-3-031-41326-1\_5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FuruyaKIMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/GiraudN23, author = {Vincent Giraud and David Naccache}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {3--15}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_1}, doi = {10.1007/978-3-031-41326-1\_1}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/GiraudN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HandKLMR23, author = {Samuel Hand and Alexander Koch and Pascal Lafourcade and Daiki Miyahara and L{\'{e}}o Robert}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Check Alternating Patterns: {A} Physical Zero-Knowledge Proof for Moon-or-Sun}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {255--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_14}, doi = {10.1007/978-3-031-41326-1\_14}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HandKLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LeeS23, author = {Hyeonbum Lee and Jae Hong Seo}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {{TENET:} Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {214--234}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_12}, doi = {10.1007/978-3-031-41326-1\_12}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LeeS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MarcoTV23, author = {Laurane Marco and Abdullah Talayhan and Serge Vaudenay}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {173--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_10}, doi = {10.1007/978-3-031-41326-1\_10}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MarcoTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Nuida23, author = {Koji Nuida}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {237--254}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_13}, doi = {10.1007/978-3-031-41326-1\_13}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Nuida23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/RemigioBPCZ23, author = {Riccardo Remigio and Alessandro Bertani and Mario Polino and Michele Carminati and Stefano Zanero}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {16--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_2}, doi = {10.1007/978-3-031-41326-1\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/RemigioBPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TranV23, author = {B{\'{e}}n{\'{e}}dikt Tran and Serge Vaudenay}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Extractable Witness Encryption for the Homogeneous Linear Equations Problem}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {152--172}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_9}, doi = {10.1007/978-3-031-41326-1\_9}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TranV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhaoZYSH23, author = {Jiahao Zhao and Nana Zhang and Qianqian Yang and Ling Song and Lei Hu}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Boomerang Attacks on Deoxys-BC}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {59--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_4}, doi = {10.1007/978-3-031-41326-1\_4}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhaoZYSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhuKKT23, author = {Haiming Zhu and Shoichi Kamada and Momonari Kudo and Tsuyoshi Takagi}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {117--136}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_7}, doi = {10.1007/978-3-031-41326-1\_7}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhuKKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2023, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1}, doi = {10.1007/978-3-031-41326-1}, isbn = {978-3-031-41325-4}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.