Pub Date : 2020-09-02DOI: 10.1007/978-3-030-58208-1_14
R. Kurek
{"title":"Efficient Forward-Secure Threshold Signatures","authors":"R. Kurek","doi":"10.1007/978-3-030-58208-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"51 1","pages":"239-260"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76256168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.1007/978-3-030-58208-1_15
Kai Kinoshita, Koutarou Suzuki
{"title":"Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques","authors":"Kai Kinoshita, Koutarou Suzuki","doi":"10.1007/978-3-030-58208-1_15","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_15","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"136 1","pages":"261-281"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78254073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-58208-1_4
Sergii Banin, Geir Olav Dyrkolbotn
{"title":"Detection of Running Malware Before it Becomes Malicious","authors":"Sergii Banin, Geir Olav Dyrkolbotn","doi":"10.1007/978-3-030-58208-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"13 1","pages":"57-73"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86936956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_2
Hiroshi Onuki, Yusuke Aikawa, T. Yamazaki, T. Takagi
{"title":"(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points","authors":"Hiroshi Onuki, Yusuke Aikawa, T. Yamazaki, T. Takagi","doi":"10.1007/978-3-030-26834-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_2","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"43 1","pages":"23-33"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74089632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_20
F. Durak, S. Vaudenay
{"title":"Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity","authors":"F. Durak, S. Vaudenay","doi":"10.1007/978-3-030-26834-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_20","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"21 1","pages":"343-362"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73010447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_22
Evangelos Mantas, C. Patsakis
{"title":"GRYPHON: Drone Forensics in Dataflash and Telemetry Logs","authors":"Evangelos Mantas, C. Patsakis","doi":"10.1007/978-3-030-26834-3_22","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_22","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"19 1","pages":"377-390"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84825909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_7
S. Banik, Yuki Funabiki, Takanori Isobe
{"title":"More Results on Shortest Linear Programs","authors":"S. Banik, Yuki Funabiki, Takanori Isobe","doi":"10.1007/978-3-030-26834-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"73 1","pages":"109-128"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_21
A. Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, A. Truu
{"title":"A New Approach to Constructing Digital Signature Schemes - (Short Paper)","authors":"A. Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, A. Truu","doi":"10.1007/978-3-030-26834-3_21","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_21","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"203 1","pages":"363-373"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74890702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_8
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, A. Bogdanov, S. Morioka, Takanori Isobe
{"title":"Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure","authors":"Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, A. Bogdanov, S. Morioka, Takanori Isobe","doi":"10.1007/978-3-030-26834-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_8","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"2023 1","pages":"129-145"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76285256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_3
Takuma Ito, N. Shinohara, S. Uchiyama
{"title":"An Efficient F_4 -style Based Algorithm to Solve MQ Problems","authors":"Takuma Ito, N. Shinohara, S. Uchiyama","doi":"10.1007/978-3-030-26834-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"18 1","pages":"37-52"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73402958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}