Advertisement

Table of contents

  1. Front Matter
    Pages I-XII
  2. Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
      Pages 3-18
    3. Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma
      Pages 35-47
  3. Implementation Security

    1. Front Matter
      Pages 49-49
    2. Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki
      Pages 68-83
  4. Public-Key Primitives

    1. Front Matter
      Pages 85-85
    2. Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi
      Pages 87-103
    3. Akinaga Ueda, Hayato Tada, Kaoru Kurosawa
      Pages 104-113
  5. Security in Practice

    1. Front Matter
      Pages 125-125
    2. Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
      Pages 127-142
    3. Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
      Pages 143-157
    4. Cheng Shi, Kazuki Yoneyama
      Pages 158-173
  6. Secret Sharing

    1. Front Matter
      Pages 191-191
    2. Louis Cianciullo, Hossein Ghodosi
      Pages 193-205
    3. Koji Shima, Hiroshi Doi
      Pages 206-223
  7. Symmetric-Key Primitives

  8. Provable Security

    1. Front Matter
      Pages 279-279
    2. Hayato Tada, Akinaga Ueda, Kaoru Kurosawa
      Pages 281-296
    3. Chen Qian, Mehdi Tibouchi, Rémi Géraud
      Pages 313-329
  9. Back Matter
    Pages 331-331

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. 

The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.

Keywords

Artificial intelligence Authentication Cryptanalysis Cryptography Data security Digital signatures Hardware security Network security Privacy-preserving protocols Provable security Public-key cryptography Secret key Secret sharing Security in practice Software engineering Symmetric-key cryptography

Editors and affiliations

  • Atsuo Inomata
    • 1
  • Kan Yasuda
    • 2
  1. 1.Tokyo Denki UniversityTokyoJapan
  2. 2.Nippon Telegraph and Telephone CorporationTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-97916-8
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-97915-1
  • Online ISBN 978-3-319-97916-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site