IWSEC 2013 Accepted Papers (in order of submission)

  1. Cryptanalysis of the Quaternion Rainbow
    Yasufumi Hashimoto
  2. Efficient Algorithm for Tate Pairing of Composite Order
    Yutaro Kiyomura and Tsuyoshi Takagi
  3. How to Factor $N_1$ and $N_2$ When $p_1=p_2 \bmod 2^t$
    Kaoru Kurosawa and Takuma Ueda
  4. Static Integer Overflow Vulnerability Detection in Windows Binary
    Yi Deng, Yang Zhang, Liang Cheng, and Xiaoshan Sun
  5. New Property of Diffusion Switching Mechanism on CLEFIA and its Application to DFA
    Yosuke Todo and Yu Sasaki
  6. Game-Theoretic Security for Bit Commitment
    Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
  7. Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption
    Takato Hirano, Mitsuhiro Hattori, Takashi Ito, and Nori Matsuda
  8. Attacks to the Proxy Re-Encryption Schemes from IWSEC2011
    Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka
  9. On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary
    Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
  10. Toward Practical Searchable Symmetric Encryption
    Wakaha Ogata, Keita Koiwa, Akira Kanaoka, and Shin'ichiro Matsuo
  11. Solving Google's Continuous Audio CAPTCHA with HMM-based Automatic Speech Recognition
    Shotaro Sano, Takuma Otsuka, and Hiroshi Okuno
  12. Statistics on Encrypted Cloud Data
    Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, and Bao-Shuh Paul Lin
  13. Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption
    Takahiro Matsuda and Goichiro Hanaoka
  14. Secure Log Transfer by Replacing a Library in a Virtual Machine
    Masaya Sato and Toshihiro Yamauchi
  15. One-Round Authenticated Key Exchange without Implementation Trick
    Kazuki Yoneyama
  16. Improvement of Faug`ere et al.'s method to solve ECDLP
    Huang Yun-Ju, Christophe Petit, Naoyuki Shinohara, and Tsuyoshi Takagi
  17. Differential Power Analysis of MAC-Keccak at Any Key-Length
    Mostafa Taha and Patrick Schaumont
  18. Unconditionally Secure Oblivious Transfer from Real Network Behavior
    Paolo Palmieri and Olivier Pereira
  19. Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
    Yusuke Naito,Yu Sasaki, Lei Wang, and Kan Yasuda
  20. Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces
    Jose Moreira, Marcel Fernandez, and Grigory Kabatiansky