TY - BOOK AU - Tanaka,Keisuke AU - Suga,Yuji ED - International Workshop on Security TI - Advances in information and computer security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings T2 - Lecture notes in computer science, SN - 9783319224251 AV - QA76.9.A25 U1 - 005.8 23 PY - 2015/// CY - Cham PB - Springer KW - Computer security KW - Congresses KW - Data encryption (Computer science) KW - Sécurité informatique KW - Congrès KW - Chiffrement (Informatique) KW - Data encryption KW - bicssc KW - Discrete mathematics KW - Algorithms & data structures KW - Network hardware KW - Computers KW - Security KW - General KW - bisacsh KW - Data Processing KW - Programming KW - Algorithms KW - Hardware KW - Network Hardware KW - fast KW - computerwetenschappen KW - computer sciences KW - wiskunde KW - mathematics KW - algoritmen KW - algorithms KW - computeranalyse KW - computer analysis KW - gegevensbeheer KW - data management KW - computernetwerken KW - computer networks KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Conference papers and proceedings N1 - International conference proceedings; Includes author index; Intro; Preface; IWSEC 2015 10th International Workshop on Security; Contents; Identity-Based Encryption; Identity-Based Lossy Encryption from Learning with Errors; 1 Introduction; 1.1 Background; 1.2 Our Contributions; 1.3 Related Work; 1.4 Organization; 2 Preliminaries; 2.1 Notations; 2.2 Min-Entropy; 2.3 Learning with Errors; 2.4 Discrete Gaussians; 2.5 Lossy Encryption; 2.6 Some Results About Randomness; 3 Identity-Based Lossy Encryption; 3.1 Selective Opening Security; 3.2 Construction from LWE; 4 Conclusion; References; Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption; 1 Introduction2 Preliminaries; 3 Revocable Hierarchical Identity-Based Encryption; 4 Proposed Adaptive-ID Secure RHIBE; 5 Conclusion; References; Elliptic Curve Cryptography; Invalid Curve Attacks in a GLS Setting; 1 Introduction; 2 Preliminaries; 3 Invalid Curve Attack on GLS Scalar Multiplication; 4 Complexity Analysis; 5 Implementations; 6 Conclusion; A Computation of (u) on u [1, 3]; References; New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates; 1 Introduction; 2 Preliminary; 3 Speeding up Some Elliptic Curve Operations in Affine Coordinates; 4 Comparisons; 4.1 Point Operations4.2 Scalar Multiplications; 5 Conclusions; References; Factoring; Implicit Factorization of RSA Moduli Revisited (Short Paper); 1 Introduction; 2 Preliminaries; 3 Previous Method of Factoring Two RSA Moduli with Implicitly Common Middle Bits; 4 Our Improvement; 5 Conclusion; References; Symmetric Cryptanalysis; Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions; 1 Introduction; 2 The Hash Function Family; 3 Improved Preimage Attacks on Reduced-Round GOST; 3.1 Overview of the Preimage Attack on 5-Round GOST-2563.2 Phase 1. Construct the Multicollisions; 3.3 Phase 2. Invert the Output Transformation; 3.4 Phase 3. Generate the Preimage; 3.5 Summarize the 5-Round Attack; 3.6 Extend the Preimage Attack to More Rounds; 4 Conclusion and Open Problems; References; Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s; 1 Introduction; 2 MILP Based Framework for Automatic Differential Cryptanalysis; 3 Techniques for Obtaining Better Characteristics; 4 Application to DESL and LBlock-s4.1 Improved Single-Key and Related-Key Differential Characteristics for DESL; 4.2 Tighter Security Bound for LBlock-s; 5 Conclusion and Discussion; References; Provable Security; NM-CPA Secure Encryption with Proofs of Plaintext Knowledge; 1 Introduction; 2 Preliminaries; 2.1 Public Key Encryption; 2.2 Proofs of Knowledge; 3 Our Scheme; 4 Security Proof; 5 Applications: Electronic Voting; 5.1 Election Schemes; 5.2 Sufficient Conditions for Ballot Secrecy; 5.3 Towards a Secure Variant of Helios; 6 Related Work; 7 Conclusion; A Proof of Theorem 1 N2 - This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware UR - https://link.springer.com/10.1007/978-3-319-22425-1 ER -