Skip to main content
  • Conference proceedings
  • © 2014

Advances in Information and Computer Security

9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8639)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWSEC: International Workshop on Security

Conference proceedings info: IWSEC 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. System Security

    1. Privacy-Friendly Access Control Based on Personal Attributes

      • Jan Hajny, Lukas Malina, Ondrej Tethal
      Pages 1-16
    2. Are You Threatening My Hazards?

      • Marina Krotofil, Jason Larsen
      Pages 17-32
    3. Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints

      • Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama
      Pages 48-61
    4. Key Management for Onion Routing in a True Peer to Peer Setting

      • Paolo Palmieri, Johan Pouwelse
      Pages 62-71
  3. Threshold Cryptography

    1. Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication

      • Rui Xu, Kirill Morozov, Tsuyoshi Takagi
      Pages 72-87
    2. Secure Multi-Party Computation for Elliptic Curves

      • Koutarou Suzuki, Kazuki Yoneyama
      Pages 98-108
    3. More Constructions of Re-splittable Threshold Public Key Encryption

      • Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
      Pages 109-118
  4. Hardware Security

    1. Deterministic Hard Fault Attack on Trivium

      • Avijit Dutta, Goutam Paul
      Pages 134-145
    2. DPA Resilience of Rotation-Symmetric S-boxes

      • Muhammet Ali Evci, Selçuk Kavut
      Pages 146-157
    3. A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering

      • Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii
      Pages 158-173
    4. Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics

      • Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng
      Pages 174-186
  5. Foundation

    1. Improved Linear Cryptanalysis of Reduced-Round MIBS

      • Aslı Bay, Jialin Huang, Serge Vaudenay
      Pages 204-220
    2. Characterization of EME with Linear Mixing

      • Nilanjan Datta, Mridul Nandi
      Pages 221-239
  6. Encryption

    1. Related Key Secure PKE from Hash Proof Systems

      • Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
      Pages 250-265

Other Volumes

  1. Advances in Information and Computer Security

About this book

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

Editors and Affiliations

  • Network Security Research Institute, National Institute of Information and Communications Technology (NICT), Koganei, Japan

    Maki Yoshida

  • College of Information Science and Engineering, Ritsumeikan University, Kusatsu, Japan

    Koichi Mouri

Bibliographic Information

  • Book Title: Advances in Information and Computer Security

  • Book Subtitle: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

  • Editors: Maki Yoshida, Koichi Mouri

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-09843-2

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-09842-5Published: 04 August 2014

  • eBook ISBN: 978-3-319-09843-2Published: 19 August 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 287

  • Number of Illustrations: 62 b/w illustrations

  • Topics: Systems and Data Security, Cryptology

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access