Skip to main content
  • Conference proceedings
  • © 2021

Advances in Information and Computer Security

16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12835)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWSEC: International Workshop on Security

Conference proceedings info: IWSEC 2021.

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-85987-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (14 papers)

  1. Front Matter

    Pages i-xii
  2. Lattice-Based Cryptography

    1. Front Matter

      Pages 1-1
    2. A Trace Map Attack Against Special Ring-LWE Samples

      • Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda
      Pages 3-22
    3. Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem

      • Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi
      Pages 23-41
  3. System Security

    1. Front Matter

      Pages 43-43
    2. (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring

      • Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi
      Pages 64-73
  4. Multiparty Computation

    1. Front Matter

      Pages 75-75
    2. Evolving Homomorphic Secret Sharing for Hierarchical Access Structures

      • Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
      Pages 77-96
  5. Machine Learning and Security

    1. Front Matter

      Pages 97-97
    2. Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions

      • Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata
      Pages 99-118
    3. Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language

      • Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park et al.
      Pages 119-133
  6. Post-Quantum Cryptography (1)

    1. Front Matter

      Pages 135-135
    2. FFT Program Generation for Ring LWE-Based Cryptography

      • Masahiro Masuda, Yukiyoshi Kameyama
      Pages 151-171
  7. Symmetric-Key Cryptography

    1. Front Matter

      Pages 173-173
    2. Optimum Attack on 3-Round Feistel-2 Structure

      • Takanori Daiza, Kaoru Kurosawa
      Pages 175-192
  8. Post-Quantum Cryptography (2)

    1. Front Matter

      Pages 193-193
    2. An Intermediate Secret-Guessing Attack on Hash-Based Signatures

      • Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
      Pages 195-215
    3. (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH

      • Jason T. LeGrow, Aaron Hutchinson
      Pages 216-226

Other Volumes

  1. Advances in Information and Computer Security

    16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings

About this book

This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security.

Keywords

  • artificial intelligence
  • authentication
  • communication systems
  • computer crime
  • computer hardware
  • computer networks
  • cybersecurity
  • computer security
  • computer systems
  • cryptography
  • data security
  • databases
  • distributed computer systems
  • engineering
  • post-quantum cryptography
  • machine learning
  • network protocols
  • network security
  • public key cryptography
  • signal processing

Editors and Affiliations

  • Hiroshima University, Hiroshima, Japan

    Toru Nakanishi

  • National Institute of Information and Communications Technology, Tokyo, Japan

    Ryo Nojima

Bibliographic Information

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-85987-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)