IWSEC: International Workshop on Security

Advances in Information and Computer Security

10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

  • Keisuke Tanaka
  • Yuji Suga

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9241)

Also part of the Security and Cryptology book sub series (LNSC, volume 9241)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Identity-Based Encryption

    1. Front Matter
      Pages 1-1
    2. Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun
      Pages 3-20
  3. Elliptic Curve Cryptography

    1. Front Matter
      Pages 39-39
    2. Taechan Kim, Mehdi Tibouchi
      Pages 41-55
    3. Wei Yu, Kwang Ho Kim, Myong Song Jo
      Pages 56-64
  4. Factoring

    1. Front Matter
      Pages 65-65
    2. Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu
      Pages 67-76
  5. Symmetric Cryptanalysis

  6. Provable Security

    1. Front Matter
      Pages 113-113
    2. Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani
      Pages 115-134
    3. Shunsuke Taketani, Wakaha Ogata
      Pages 135-152
  7. LWE-Based Encryption

    1. Front Matter
      Pages 173-173
    2. Fuqun Wang, Kunpeng Wang, Bao Li
      Pages 175-192
    3. Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun
      Pages 193-210
  8. Secret Sharing

    1. Front Matter
      Pages 211-211

About these proceedings

Introduction

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.

Keywords

cryptographic protocols digital forensics formal methods privacy preserving data mining real world cryptography authenticated encryption cryptanalysis electronic voting elliptic curve cryptography hash function information security pairings performance public key encryption secure multiparty computation security visualization software and system security for big data spoofing tag-based encryption the meet-in-the-middle preimage attack

Editors and affiliations

  • Keisuke Tanaka
    • 1
  • Yuji Suga
    • 2
  1. 1.Tokyo Institute of TechnologyTokyoJapan
  2. 2.Internet Initiative Japan Inc.TokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-22425-1
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-22424-4
  • Online ISBN 978-3-319-22425-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering