IWSEC 2013 Accepted Papers (in order of submission)
Cryptanalysis of the Quaternion Rainbow
Yasufumi Hashimoto
Efficient Algorithm for Tate Pairing of Composite Order
Yutaro Kiyomura and Tsuyoshi Takagi
How to Factor $N_1$ and $N_2$ When $p_1=p_2 \bmod 2^t$
Kaoru Kurosawa and Takuma Ueda
Static Integer Overflow Vulnerability Detection in Windows Binary
Yi Deng, Yang Zhang, Liang Cheng, and Xiaoshan Sun
New Property of Diffusion Switching Mechanism on CLEFIA and its Application to DFA
Yosuke Todo and Yu Sasaki
Game-Theoretic Security for Bit Commitment
Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption
Takato Hirano, Mitsuhiro Hattori, Takashi Ito, and Nori Matsuda
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011
Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka
On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary
Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
Yasufumi Hashimoto
Yutaro Kiyomura and Tsuyoshi Takagi
Kaoru Kurosawa and Takuma Ueda
Yi Deng, Yang Zhang, Liang Cheng, and Xiaoshan Sun
Yosuke Todo and Yu Sasaki
Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
Takato Hirano, Mitsuhiro Hattori, Takashi Ito, and Nori Matsuda
Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka
Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
Wakaha Ogata, Keita Koiwa, Akira Kanaoka, and Shin'ichiro Matsuo
Shotaro Sano, Takuma Otsuka, and Hiroshi Okuno
Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, and Bao-Shuh Paul Lin
Takahiro Matsuda and Goichiro Hanaoka
Masaya Sato and Toshihiro Yamauchi
Kazuki Yoneyama
Huang Yun-Ju, Christophe Petit, Naoyuki Shinohara, and Tsuyoshi Takagi
Mostafa Taha and Patrick Schaumont
Paolo Palmieri and Olivier Pereira
Yusuke Naito,Yu Sasaki, Lei Wang, and Kan Yasuda
Jose Moreira, Marcel Fernandez, and Grigory Kabatiansky