Abstract is missing.
- Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi. 3-18 [doi]
- Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its ReparationTerry Shue Chien Lau, Chik-How Tan. 19-34 [doi]
- Inference Attacks on Encrypted Databases Based on Order Preserving Assignment ProblemSota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma. 35-47 [doi]
- Entropy Reduction for the Correlation-Enhanced Power Analysis Collision AttackAndreas Wiemers, Dominik Klein 0001. 51-67 [doi]
- Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released BinariesTakamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki. 68-83 [doi]
- Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding TechniquesWeiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi. 87-103 [doi]
- (Short Paper) How to Solve DLOG Problem with Auxiliary InputAkinaga Ueda, Hayato Tada, Kaoru Kurosawa. 104-113 [doi]
- (Short Paper) Parameter Trade-Offs for NFS and ECMKazumaro Aoki. 114-123 [doi]
- Is Java Card Ready for Hash-Based Signatures?Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren. 127-142 [doi]
- Detecting Privacy Information Abuse by Android Apps from API Call LogsKatsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 143-157 [doi]
- Verification of LINE Encryption Version 1.0 Using ProVerifCheng Shi, Kazuki Yoneyama. 158-173 [doi]
- The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data SharingMakoto Iguchi, Taro Uematsu, Tatsuro Fujii. 174-189 [doi]
- Improvements to Almost Optimum Secret Sharing with Cheating DetectionLouis Cianciullo, Hossein Ghodosi. 193-205 [doi]
- XOR-Based Hierarchical Secret Sharing SchemeKoji Shima, Hiroshi Doi. 206-223 [doi]
- Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFTYu Sasaki. 227-243 [doi]
- Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARKJingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang. 244-261 [doi]
- Lightweight Recursive MDS Matrices with Generalized Feistel NetworkQiuping Li, Baofeng Wu, Zhuojun Liu. 262-278 [doi]
- How to Prove KDM Security of BHHOHayato Tada, Akinaga Ueda, Kaoru Kurosawa. 281-296 [doi]
- From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS SignaturePauline Bert, Adeline Roux-Langlois. 297-312 [doi]
- Universal Witness SignaturesChen Qian 0002, Mehdi Tibouchi, Rémi Géraud. 313-329 [doi]