


default search action
19th IWSEC 2024: Kyoto, Japan
- Kazuhiko Minematsu

, Mamoru Mimura
:
Advances in Information and Computer Security - 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14977, Springer 2024, ISBN 978-981-97-7736-5
Authenticated Encryption
- Takuro Shiraya

, Kosei Sakamoto, Takanori Isobe:
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes. 3-22 - Alexander Bille, Elmar Tischhauser

:
Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. 23-42
Symmetric-key Cryptanalysis
- Eik List

:
Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES. 45-64 - Bungo Taga

, Norimitsu Ito
, Takako Okano:
Weak Keys of the Full MISTY1 Recovered in Practical Time. 65-81
Protocols
- Yoshiaki Honda, Kazumasa Shinagawa:

Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. 85-100 - Anushree Belel

, Ratna Dutta:
Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. 101-121
Analysis of Public-key Cryptosystems
- Vincent Hwang:

Formal Verification of Emulated Floating-Point Arithmetic in Falcon. 125-141 - Arata Sato

, Aurélien Auzemery, Akira Katayama, Masaya Yasuda:
Experimental Analysis of Integer Factorization Methods Using Lattices. 142-157 - Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi:

Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. 158-176
Vulnerability
- Rin Miyachi

, Konan Nagashima, Taiichi Saito:
Race Condition Vulnerabilities in WordPress Plug-ins. 179-194 - Dario Stabili

, Tobia Bocchi
, Filip Valgimigli
, Mirco Marchetti
:
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study. 195-210
Malware Countermeasure
- Arash Mahboubi

, Seyit Camtepe
, Keyvan Ansari
, Marcin Piotr Pawlowski
, Pawel Morawiecki
, Jaroslaw Duda
, Josef Pieprzyk
:
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. 213-233 - Nobuyuki Sugio

, Hokuto Ito:
Implementation for Malicious Software Using ChatGPT-4. 234-243 - Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh, Tansu Alpcan:

A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. 244-254
Network Security and Privacy
- Tristan Bilot

, Nour El Madhoun
, Khaldoun Al Agha
, Anis Zouaoui
:
Few Edges are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. 257-276 - Jaiden Fairoze, Peitong Duan:

Information Leakage Through Packet Lengths in RTC Traffic. 277-296 - Kabuto Okajima

, Koji Chida
:
A Study on Anonymization Through Participation in iPWS Cup 2023. 297-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














