The International Symposium on Information Theory and Its Applications

number title/author
Tu-AM-1-2.1An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields
Shota Terada, Hideto Nakano, Shinya Okumura, Atsuko Miyaji,
Tu-AM-1-2.2An Observation on the Randomness Assumption over Lattices
Tadanori Teruya,
Tu-AM-1-2.3An Analysis of a Defence Method against Slow HTTP DoS Attack
Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata,
Tu-AM-1-2.4A Watermarking Method for Embedding into the External Shapes of Objects
Hiroshi Yamamoto, Kazuki Sano,
Tu-AM-1-2.5Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif
Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai,