Advances in Information and Computer Security

10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

  • Keisuke Tanaka
  • Yuji Suga
Conference proceedings IWSEC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9241)

Also part of the Security and Cryptology book sub series (LNSC, volume 9241)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Identity-Based Encryption

    1. Front Matter
      Pages 1-1
    2. Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun
      Pages 3-20
  3. Elliptic Curve Cryptography

    1. Front Matter
      Pages 39-39
    2. Taechan Kim, Mehdi Tibouchi
      Pages 41-55
    3. Wei Yu, Kwang Ho Kim, Myong Song Jo
      Pages 56-64
  4. Factoring

    1. Front Matter
      Pages 65-65
    2. Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu
      Pages 67-76
  5. Symmetric Cryptanalysis

  6. Provable Security

    1. Front Matter
      Pages 113-113
    2. Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani
      Pages 115-134
    3. Shunsuke Taketani, Wakaha Ogata
      Pages 135-152
  7. LWE-Based Encryption

    1. Front Matter
      Pages 173-173
    2. Fuqun Wang, Kunpeng Wang, Bao Li
      Pages 175-192
    3. Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun
      Pages 193-210
  8. Secret Sharing

    1. Front Matter
      Pages 211-211
  9. Privacy-Preserving and Anonymity

    1. Front Matter
      Pages 223-223
    2. Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi
      Pages 225-241
    3. Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka
      Pages 242-261
    4. Shahidatul Sadiah, Toru Nakanishi, Nobuo Funabiki
      Pages 262-278
  10. Secure Protocol

    1. Front Matter
      Pages 279-279
    2. Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide et al.
      Pages 281-297
  11. Systems Security

  12. Security in Hardware

    1. Front Matter
      Pages 345-345
    2. Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing
      Pages 347-356
  13. Back Matter
    Pages 357-357

About these proceedings


This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.


cryptographic protocols digital forensics formal methods privacy preserving data mining real world cryptography authenticated encryption cryptanalysis electronic voting elliptic curve cryptography hash function information security pairings performance public key encryption secure multiparty computation security visualization software and system security for big data spoofing tag-based encryption the meet-in-the-middle preimage attack

Editors and affiliations

  • Keisuke Tanaka
    • 1
  • Yuji Suga
    • 2
  1. 1.Tokyo Institute of TechnologyTokyoJapan
  2. 2.Internet Initiative Japan Inc.TokyoJapan

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-22424-4
  • Online ISBN 978-3-319-22425-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment