number | title/author |
---|---|
Tu-AM-1-2.1 | An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields Shota Terada, Hideto Nakano, Shinya Okumura, Atsuko Miyaji, |
Tu-AM-1-2.2 | An Observation on the Randomness Assumption over Lattices Tadanori Teruya, |
Tu-AM-1-2.3 | An Analysis of a Defence Method against Slow HTTP DoS Attack Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata, |
Tu-AM-1-2.4 | A Watermarking Method for Embedding into the External Shapes of Objects Hiroshi Yamamoto, Kazuki Sano, |
Tu-AM-1-2.5 | Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai, |