Pub Date : 2023-01-01DOI: 10.1007/978-3-031-41326-1_9
Bénédikt Tran, S. Vaudenay
{"title":"Extractable Witness Encryption for the Homogeneous Linear Equations Problem","authors":"Bénédikt Tran, S. Vaudenay","doi":"10.1007/978-3-031-41326-1_9","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"12 1","pages":"152-172"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79567782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_5
Shota Fujii, N. Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi
{"title":"CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs","authors":"Shota Fujii, N. Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi","doi":"10.1007/978-3-031-15255-9_5","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_5","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"37 1","pages":"85-104"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89213524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_3
Sihao Shen, Zhenzhen Li, Wei Song
{"title":"Methods of Extracting Parameters of the Processor Caches","authors":"Sihao Shen, Zhenzhen Li, Wei Song","doi":"10.1007/978-3-031-15255-9_3","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"9 1","pages":"47-65"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89323782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_9
Jing-Shiuan You, Zi-Yuan Liu, R. Tso, Yi-Fan Tseng, M. Mambo
{"title":"Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices","authors":"Jing-Shiuan You, Zi-Yuan Liu, R. Tso, Yi-Fan Tseng, M. Mambo","doi":"10.1007/978-3-031-15255-9_9","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"60 1","pages":"166-186"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88182719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_4
Hiroki Kuzuno, Toshihiro Yamauchi
{"title":"KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key","authors":"Hiroki Kuzuno, Toshihiro Yamauchi","doi":"10.1007/978-3-031-15255-9_4","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"14 1","pages":"66-84"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79791120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Card-Based Secure Sorting Protocol","authors":"Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yu-ichi Hayashi, T. Mizuki","doi":"10.1007/978-3-031-15255-9_12","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"59 1","pages":"224-240"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79922906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_6
Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, K. Yasuda
{"title":"Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes","authors":"Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, K. Yasuda","doi":"10.1007/978-3-031-15255-9_6","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"24 1","pages":"107-127"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74804113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_7
Takanori Daiza, Kazuki Yoneyama
{"title":"Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles","authors":"Takanori Daiza, Kazuki Yoneyama","doi":"10.1007/978-3-031-15255-9_7","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"SE-10 1","pages":"128-144"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84637227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-031-15255-9_8
Taku Kato, Yutaro Kiyomura, T. Takagi
{"title":"Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values","authors":"Taku Kato, Yutaro Kiyomura, T. Takagi","doi":"10.1007/978-3-031-15255-9_8","DOIUrl":"https://doi.org/10.1007/978-3-031-15255-9_8","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":"147-165"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75938891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1007/978-3-030-85987-9_6
Yun Fan, Toshiki Shibahara, Y. Ohsita, Daiki Chiba, Mitsuaki Akiyama, M. Murata
{"title":"Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions","authors":"Yun Fan, Toshiki Shibahara, Y. Ohsita, Daiki Chiba, Mitsuaki Akiyama, M. Murata","doi":"10.1007/978-3-030-85987-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-85987-9_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"52 1","pages":"99-118"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85178164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}