Charalambous, Charalambos D.; Stavrou, Photios A.; Kourtellaris, Christos K. Directed information on abstract spaces: properties and extremum problems. (English) Zbl 1404.94002 van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 307-315 (2015). MSC: 94A08 93E20 PDF BibTeX XML Cite \textit{C. D. Charalambous} et al., Lect. Notes Control Inf. Sci. 456, 307--315 (2015; Zbl 1404.94002) Full Text: DOI arXiv OpenURL
Charalambous, Charalambos D.; Kourtellaris, Christos K.; Stavrou, Photios A. On Shannon’s duality of a source and a channel and nonanticipative communication and communication for control. (English) Zbl 1404.94029 van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 291-305 (2015). MSC: 94A24 60J10 PDF BibTeX XML Cite \textit{C. D. Charalambous} et al., Lect. Notes Control Inf. Sci. 456, 291--305 (2015; Zbl 1404.94029) Full Text: DOI OpenURL
van Schuppen, Jan H. What Is distributed control with direct communication between controllers? (English) Zbl 1403.93027 van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 183-190 (2015). MSC: 93A14 93B50 90B18 94A05 PDF BibTeX XML Cite \textit{J. H. van Schuppen}, Lect. Notes Control Inf. Sci. 456, 183--190 (2015; Zbl 1403.93027) Full Text: DOI OpenURL
Hanzlik, Lucjan; Kutyłowski, Mirosław; Yung, Moti Hard invalidation of electronic signatures. (English) Zbl 1403.94097 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 421-436 (2015). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{L. Hanzlik} et al., Lect. Notes Comput. Sci. 9065, 421--436 (2015; Zbl 1403.94097) Full Text: DOI OpenURL
Wang, Qingbin; Chen, Shaozhen; Ge, Aijun A new lattice-based threshold attribute-based signature scheme. (English) Zbl 1403.94101 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 406-420 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{Q. Wang} et al., Lect. Notes Comput. Sci. 9065, 406--420 (2015; Zbl 1403.94101) Full Text: DOI OpenURL
Roy, Dibyendu; Chaturvedi, Ankita; Mukhopadhyay, Sourav New constructions of T-function. (English) Zbl 1403.94076 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 395-405 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Roy} et al., Lect. Notes Comput. Sci. 9065, 395--405 (2015; Zbl 1403.94076) Full Text: DOI OpenURL
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Fully secure online/offline predicate and attribute-based encryption. (English) Zbl 1403.68057 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 331-345 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 9065, 331--345 (2015; Zbl 1403.68057) Full Text: DOI OpenURL
Wei, Jianghong; Huang, Xinyi; Hu, Xuexian; Liu, Wenfen Revocable threshold attribute-based signature against signing key exposure. (English) Zbl 1403.94102 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 316-330 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{J. Wei} et al., Lect. Notes Comput. Sci. 9065, 316--330 (2015; Zbl 1403.94102) Full Text: DOI OpenURL
Kawai, Yutaka Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption. (English) Zbl 1403.94066 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 301-315 (2015). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Kawai}, Lect. Notes Comput. Sci. 9065, 301--315 (2015; Zbl 1403.94066) Full Text: DOI OpenURL
Cheng, Shantian; Zhang, Juanyang Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method. (English) Zbl 1403.94050 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 283-297 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Cheng} and \textit{J. Zhang}, Lect. Notes Comput. Sci. 9065, 283--297 (2015; Zbl 1403.94050) Full Text: DOI OpenURL
Velten, Michael; Schneider, Peter; Wessel, Sascha; Eckert, Claudia User identity verification based on touchscreen interaction analysis in web contexts. (English) Zbl 1403.94085 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 268-282 (2015). MSC: 94A60 68M11 68P25 PDF BibTeX XML Cite \textit{M. Velten} et al., Lect. Notes Comput. Sci. 9065, 268--282 (2015; Zbl 1403.94085) Full Text: DOI OpenURL
Bauman, Erick; Lu, Yafeng; Lin, Zhiqiang Half a century of practice: who Is still storing plaintext passwords? (English) Zbl 1403.94042 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 253-267 (2015). MSC: 94A60 68M11 68P25 PDF BibTeX XML Cite \textit{E. Bauman} et al., Lect. Notes Comput. Sci. 9065, 253--267 (2015; Zbl 1403.94042) Full Text: DOI OpenURL
Du, Shaoyu; Li, Zhenqi; Zhang, Bin; Lin, Dongdai Combined cache timing attacks and template attacks on stream cipher MUGI. (English) Zbl 1403.94054 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 235-249 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Du} et al., Lect. Notes Comput. Sci. 9065, 235--249 (2015; Zbl 1403.94054) Full Text: DOI OpenURL
Guo, Chun; Zhang, Hailong; Lin, Dongdai Estimating differential-linear distinguishers and applications to CTC2. (English) Zbl 1403.94060 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 220-234 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Guo} et al., Lect. Notes Comput. Sci. 9065, 220--234 (2015; Zbl 1403.94060) Full Text: DOI OpenURL
Yang, Qianqian; Hu, Lei; Sun, Siwei; Qiao, Kexin; Song, Ling; Shan, Jinyong; Ma, Xiaoshuang Improved differential analysis of block cipher PRIDE. (English) Zbl 1403.94088 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 209-219 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Yang} et al., Lect. Notes Comput. Sci. 9065, 209--219 (2015; Zbl 1403.94088) Full Text: DOI OpenURL
Sun, Yang; Wu, Qianhong; Qin, Bo; Wang, Yujue; Liu, Jianwei Batch blind signatures on elliptic curves. (English) Zbl 1403.94099 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015). MSC: 94A62 14G50 PDF BibTeX XML Cite \textit{Y. Sun} et al., Lect. Notes Comput. Sci. 9065, 192--206 (2015; Zbl 1403.94099) Full Text: DOI OpenURL
Tian, Song; Yu, Wei; Li, Bao; Wang, Kunpeng Some elliptic subcovers of genus 3 hyperelliptic curves. (English) Zbl 1403.14064 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 181-191 (2015). MSC: 14H52 14G50 94A60 PDF BibTeX XML Cite \textit{S. Tian} et al., Lect. Notes Comput. Sci. 9065, 181--191 (2015; Zbl 1403.14064) Full Text: DOI OpenURL
Tian, Song; Yu, Wei; Li, Bao; Wang, Kunpeng Models of curves from GHS attack in odd characteristic. (English) Zbl 1403.94084 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 171-180 (2015). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{S. Tian} et al., Lect. Notes Comput. Sci. 9065, 171--180 (2015; Zbl 1403.94084) Full Text: DOI OpenURL
Zhao, Shijun; Zhang, Qianying sHMQV: an efficient key exchange protocol for power-limited devices. (English) Zbl 1403.94094 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 154-167 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Zhao} and \textit{Q. Zhang}, Lect. Notes Comput. Sci. 9065, 154--167 (2015; Zbl 1403.94094) Full Text: DOI OpenURL
Tian, Baoping; Wei, Fushan; Ma, Chuangui Strongly secure key exchange protocol with minimal KEM. (English) Zbl 1403.94082 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 139-153 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Tian} et al., Lect. Notes Comput. Sci. 9065, 139--153 (2015; Zbl 1403.94082) Full Text: DOI OpenURL
Haddadi, Fariba; Le Cong, Duc; Porter, Laura; Zincir-Heywood, A. Nur On the effectiveness of different botnet detection approaches. (English) Zbl 1403.94061 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 121-135 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Haddadi} et al., Lect. Notes Comput. Sci. 9065, 121--135 (2015; Zbl 1403.94061) Full Text: DOI OpenURL
Li, Weixuan; Yu, Wei; Wang, Kunpeng Analysis of fractional \(\omega\)mbNAF for scalar multiplication. (English) Zbl 1403.94068 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 109-120 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Li} et al., Lect. Notes Comput. Sci. 9065, 109--120 (2015; Zbl 1403.94068) Full Text: DOI OpenURL
Peng, Liqiang; Hu, Lei; Huang, Zhangjie; Xu, Jun Partial prime factor exposure attacks on RSA and its Takagi’s variant. (English) Zbl 1403.94074 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 96-108 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Peng} et al., Lect. Notes Comput. Sci. 9065, 96--108 (2015; Zbl 1403.94074) Full Text: DOI OpenURL
Sun, Xiaochao; Li, Bao; Lu, Xianhui Cramer-Shoup like chosen ciphertext security from LPN. (English) Zbl 1403.94080 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Sun} et al., Lect. Notes Comput. Sci. 9065, 79--95 (2015; Zbl 1403.94080) Full Text: DOI OpenURL
Ding, Lin; Jin, Chenhui; Guan, Jie; Zhang, Shaowu; Cui, Ting; Zhao, Wei New related key attacks on the RAKAPOSHI stream cipher. (English) Zbl 1403.94053 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 65-75 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Ding} et al., Lect. Notes Comput. Sci. 9065, 65--75 (2015; Zbl 1403.94053) Full Text: DOI OpenURL
Du, Shaoyu; Zhang, Bin; Li, Zhenqi; Lin, Dongdai Fault attacks on stream cipher Scream. (English) Zbl 1403.94055 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 50-64 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Du} et al., Lect. Notes Comput. Sci. 9065, 50--64 (2015; Zbl 1403.94055) Full Text: DOI OpenURL
AlTawy, Riham; Youssef, Amr M. Differential fault analysis of streebog. (English) Zbl 1403.94040 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 9065, 35--49 (2015; Zbl 1403.94040) Full Text: DOI OpenURL
Milovanović, Emina; Stojčev, Mile; Milovanović, Igor; Nikolić, Tatjana; Stamenković, Zoran Concurrent generation of pseudo random numbers with LFSR of Fibonacci and Galois type. (English) Zbl 1413.65005 Comput. Inform. 34, No. 4, 941-958 (2015). MSC: 65C10 65Y10 94A55 94C12 PDF BibTeX XML Cite \textit{E. Milovanović} et al., Comput. Inform. 34, No. 4, 941--958 (2015; Zbl 1413.65005) OpenURL
Wu, Zhenxing; Lu, Xi; Deng, Yong Image edge detection based on local dimension: a complex networks approach. (English) Zbl 1400.94037 Physica A 440, 9-18 (2015). MSC: 94A08 PDF BibTeX XML Cite \textit{Z. Wu} et al., Physica A 440, 9--18 (2015; Zbl 1400.94037) Full Text: DOI OpenURL
Oliveira, Marcos William da Silva; da Silva, Núbia Rosa; Manzanera, Antoine; Bruno, Odemir Martinez Feature extraction on local jet space for texture classification. (English) Zbl 1400.94027 Physica A 439, 160-170 (2015). MSC: 94A08 PDF BibTeX XML Cite \textit{M. W. da S. Oliveira} et al., Physica A 439, 160--170 (2015; Zbl 1400.94027) Full Text: DOI HAL OpenURL
Preda, Vasile; Dedu, Silvia; Gheorghe, Carmen New classes of Lorenz curves by maximizing Tsallis entropy under mean and Gini equality and inequality constraints. (English) Zbl 1400.91411 Physica A 436, 925-932 (2015). MSC: 91B82 90C90 94A17 PDF BibTeX XML Cite \textit{V. Preda} et al., Physica A 436, 925--932 (2015; Zbl 1400.91411) Full Text: DOI OpenURL
Macedo, D. X.; Guedes, I. Fisher information and Shannon entropy of position-dependent mass oscillators. (English) Zbl 1400.94096 Physica A 434, 211-219 (2015). MSC: 94A17 81Q05 82B05 PDF BibTeX XML Cite \textit{D. X. Macedo} and \textit{I. Guedes}, Physica A 434, 211--219 (2015; Zbl 1400.94096) Full Text: DOI OpenURL
Contreras-Reyes, Javier E. Rényi entropy and complexity measure for skew-Gaussian distributions and related families. (English) Zbl 1400.60017 Physica A 433, 84-91 (2015). MSC: 60E05 94A17 PDF BibTeX XML Cite \textit{J. E. Contreras-Reyes}, Physica A 433, 84--91 (2015; Zbl 1400.60017) Full Text: DOI arXiv OpenURL
Toscani, Giuseppe A concavity property for the reciprocal of Fisher information and its consequences on Costa’s EPI. (English) Zbl 1400.94103 Physica A 432, 35-42 (2015). MSC: 94A17 PDF BibTeX XML Cite \textit{G. Toscani}, Physica A 432, 35--42 (2015; Zbl 1400.94103) Full Text: DOI arXiv OpenURL
Xiong, Gang; Yu, Wenxian; Zhang, Shuning Singularity power spectrum distribution. (English) Zbl 1400.94071 Physica A 431, 63-73 (2015). MSC: 94A12 PDF BibTeX XML Cite \textit{G. Xiong} et al., Physica A 431, 63--73 (2015; Zbl 1400.94071) Full Text: DOI OpenURL
Ollinger, Nicolas (ed.) Mathematical informatics. A photography in 2015. (Informatique mathématique. Une photographie en 2015.) (French) Zbl 1398.94012 Paris: CNRS Éditions (ISBN 978-2-271-08791-1/pbk). vii, 252 p. (2015). MSC: 94-06 68-06 94A15 68Q01 00A09 00B15 PDF BibTeX XML Cite \textit{N. Ollinger} (ed.), Informatique mathématique. Une photographie en 2015. Paris: CNRS Éditions (2015; Zbl 1398.94012) OpenURL
Smith, Adam A.; Whitcher, Ursula Making a hash of things. (English) Zbl 1398.94162 Math Horiz. 23, No. 2, 5-8 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. A. Smith} and \textit{U. Whitcher}, Math Horiz. 23, No. 2, 5--8 (2015; Zbl 1398.94162) Full Text: DOI OpenURL
Zhang, Zhenfeng; Yang, Kang; Zhang, Jiang; Chen, Cheng Security of the SM2 signature scheme against generalized key substitution attacks. (English) Zbl 1398.94188 Chen, Liqun (ed.) et al., Security standardisation research. Second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27151-4/pbk; 978-3-319-27152-1/ebook). Lecture Notes in Computer Science 9497, 140-153 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 9497, 140--153 (2015; Zbl 1398.94188) Full Text: DOI OpenURL
Ustimenko, V. A. On Schubert cells in Grassmannians and new algorithms of multivariate cryptography. (English) Zbl 1462.94048 Tr. Inst. Mat., Minsk 23, No. 2, 137-148 (2015). MSC: 94A60 14M15 PDF BibTeX XML Cite \textit{V. A. Ustimenko}, Tr. Inst. Mat., Minsk 23, No. 2, 137--148 (2015; Zbl 1462.94048) Full Text: MNR OpenURL
Sokol, È. È. A generalization of McMillan’s theorem on the case of countable alphabet. (Russian. English summary) Zbl 1433.94046 Tr. Inst. Mat., Minsk 23, No. 1, 115-122 (2015). MSC: 94A17 PDF BibTeX XML Cite \textit{È. È. Sokol}, Tr. Inst. Mat., Minsk 23, No. 1, 115--122 (2015; Zbl 1433.94046) Full Text: MNR OpenURL
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9241, 281--297 (2015; Zbl 1398.68145) Full Text: DOI OpenURL
Sadiah, Shahidatul; Nakanishi, Toru; Funabiki, Nobuo Anonymous credential system with efficient proofs for monotone formulas on attributes. (English) Zbl 1398.94203 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 262-278 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{S. Sadiah} et al., Lect. Notes Comput. Sci. 9241, 262--278 (2015; Zbl 1398.94203) Full Text: DOI OpenURL
Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015). MSC: 68P25 92D10 94A60 PDF BibTeX XML Cite \textit{T. Teruya} et al., Lect. Notes Comput. Sci. 9241, 242--261 (2015; Zbl 1398.68148) Full Text: DOI OpenURL
Ikarashi, Dai; Kikuchi, Ryo; Chida, Koji; Takahashi, Katsumi \(k\)-anonymous microdata release via post randomisation method. (English) Zbl 1398.68138 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 225-241 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{D. Ikarashi} et al., Lect. Notes Comput. Sci. 9241, 225--241 (2015; Zbl 1398.68138) Full Text: DOI arXiv OpenURL
Hoshino, Hidetaka; Obana, Satoshi Almost optimum secret sharing schemes with cheating detection for random bit strings. (English) Zbl 1398.94196 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 213-222 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{H. Hoshino} and \textit{S. Obana}, Lect. Notes Comput. Sci. 9241, 213--222 (2015; Zbl 1398.94196) Full Text: DOI OpenURL
Fang, Fuyang; Li, Bao; Lu, Xianhui; Sun, Xiaochao Improved efficiency of MP12. (English) Zbl 1398.94113 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 193-210 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Fang} et al., Lect. Notes Comput. Sci. 9241, 193--210 (2015; Zbl 1398.94113) Full Text: DOI OpenURL
Zhang, Tingting; Li, Hongda Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model. (English) Zbl 1398.94186 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 153-172 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Zhang} and \textit{H. Li}, Lect. Notes Comput. Sci. 9241, 153--172 (2015; Zbl 1398.94186) Full Text: DOI OpenURL
Taketani, Shunsuke; Ogata, Wakaha Improvement of UC secure searchable symmetric encryption scheme. (English) Zbl 1398.68147 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 135-152 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{S. Taketani} and \textit{W. Ogata}, Lect. Notes Comput. Sci. 9241, 135--152 (2015; Zbl 1398.68147) Full Text: DOI OpenURL
Smyth, Ben; Hanatani, Yoshikazu; Muratani, Hirofumi NM-CPA secure encryption with proofs of plaintext knowledge. (English) Zbl 1398.68146 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 115-134 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{B. Smyth} et al., Lect. Notes Comput. Sci. 9241, 115--134 (2015; Zbl 1398.68146) Full Text: DOI OpenURL
Sun, Siwei; Hu, Lei; Qiao, Kexin; Ma, Xiaoshuang; Shan, Jinyong; Song, Ling Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s. (English) Zbl 1398.94167 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 97-111 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 9241, 97--111 (2015; Zbl 1398.94167) Full Text: DOI OpenURL
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions. (English) Zbl 1398.94140 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 79-96 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Ma} et al., Lect. Notes Comput. Sci. 9241, 79--96 (2015; Zbl 1398.94140) Full Text: DOI OpenURL
Peng, Liqiang; Hu, Lei; Lu, Yao; Huang, Zhangjie; Xu, Jun Implicit factorization of RSA moduli revisited (short paper). (English) Zbl 1398.94150 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 67-76 (2015). MSC: 94A60 11Y16 PDF BibTeX XML Cite \textit{L. Peng} et al., Lect. Notes Comput. Sci. 9241, 67--76 (2015; Zbl 1398.94150) Full Text: DOI OpenURL
Yu, Wei; Kim, Kwang Ho; Jo, Myong Song New fast algorithms for elliptic curve arithmetic in affine coordinates. (English) Zbl 1398.11158 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 56-64 (2015). MSC: 11Y16 11G20 11T71 94A60 PDF BibTeX XML Cite \textit{W. Yu} et al., Lect. Notes Comput. Sci. 9241, 56--64 (2015; Zbl 1398.11158) Full Text: DOI OpenURL
Kim, Taechan; Tibouchi, Mehdi Invalid curve attacks in a GLS setting. (English) Zbl 1398.94127 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 41-55 (2015). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{T. Kim} and \textit{M. Tibouchi}, Lect. Notes Comput. Sci. 9241, 41--55 (2015; Zbl 1398.94127) Full Text: DOI OpenURL
Mann, Abigail; Yeoh, Adelyn Deconstructing the Welch equation using \(p\)-adic methods. (English) Zbl 1398.11152 Undergrad. Math J. 16, No. 1, 1-23 (2015). MSC: 11T71 94A60 PDF BibTeX XML Cite \textit{A. Mann} and \textit{A. Yeoh}, Undergrad. Math J. 16, No. 1, 1--23 (2015; Zbl 1398.11152) Full Text: arXiv Link OpenURL
Denis, Loïc; Thiébaut, Eric; Soulez, Ferréol; Becker, Jean-Marie; Mourya, Rahul Fast approximations of shift-variant blur. (English) Zbl 1398.94028 Int. J. Comput. Vis. 115, No. 3, 253-278 (2015). MSC: 94A08 PDF BibTeX XML Cite \textit{L. Denis} et al., Int. J. Comput. Vis. 115, No. 3, 253--278 (2015; Zbl 1398.94028) Full Text: DOI Link OpenURL
Wang, Zilei; Feng, Jiashi; Yan, Shuicheng Collaborative linear coding for robust image classification. (English) Zbl 1398.94052 Int. J. Comput. Vis. 114, No. 2-3, 322-333 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{Z. Wang} et al., Int. J. Comput. Vis. 114, No. 2--3, 322--333 (2015; Zbl 1398.94052) Full Text: DOI OpenURL
Fawzi, Alhussein; Davies, Mike; Frossard, Pascal Dictionary learning for fast classification based on soft-thresholding. (English) Zbl 1398.94030 Int. J. Comput. Vis. 114, No. 2-3, 306-321 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{A. Fawzi} et al., Int. J. Comput. Vis. 114, No. 2--3, 306--321 (2015; Zbl 1398.94030) Full Text: DOI arXiv OpenURL
Xiang, Shiming; Meng, Gaofeng; Wang, Ying; Pan, Chunhong; Zhang, Changshui Image deblurring with coupled dictionary learning. (English) Zbl 1398.94055 Int. J. Comput. Vis. 114, No. 2-3, 248-271 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{S. Xiang} et al., Int. J. Comput. Vis. 114, No. 2--3, 248--271 (2015; Zbl 1398.94055) Full Text: DOI OpenURL
Kiechle, Martin; Habigt, Tim; Hawe, Simon; Kleinsteuber, Martin A bimodal co-sparse analysis model for image processing. (English) Zbl 1398.94038 Int. J. Comput. Vis. 114, No. 2-3, 233-247 (2015). MSC: 94A08 PDF BibTeX XML Cite \textit{M. Kiechle} et al., Int. J. Comput. Vis. 114, No. 2--3, 233--247 (2015; Zbl 1398.94038) Full Text: DOI arXiv OpenURL
Dong, Weisheng; Shi, Guangming; Ma, Yi; Li, Xin Image restoration via simultaneous sparse coding: where structured sparsity meets Gaussian scale mixture. (English) Zbl 1398.94029 Int. J. Comput. Vis. 114, No. 2-3, 217-232 (2015). MSC: 94A08 PDF BibTeX XML Cite \textit{W. Dong} et al., Int. J. Comput. Vis. 114, No. 2--3, 217--232 (2015; Zbl 1398.94029) Full Text: DOI OpenURL
Chabiron, Olivier; Malgouyres, François; Tourneret, Jean-Yves; Dobigeon, Nicolas Toward fast transform learning. (English) Zbl 1398.94025 Int. J. Comput. Vis. 114, No. 2-3, 195-216 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{O. Chabiron} et al., Int. J. Comput. Vis. 114, No. 2--3, 195--216 (2015; Zbl 1398.94025) Full Text: DOI OpenURL
Thom, Markus; Rapp, Matthias; Palm, Günther Efficient dictionary learning with sparseness-enforcing projections. (English) Zbl 1398.94051 Int. J. Comput. Vis. 114, No. 2-3, 168-194 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{M. Thom} et al., Int. J. Comput. Vis. 114, No. 2--3, 168--194 (2015; Zbl 1398.94051) Full Text: DOI arXiv OpenURL
Wen, Bihan; Ravishankar, Saiprasad; Bresler, Yoram Structured overcomplete sparsifying transform learning with convergence guarantees and applications. (English) Zbl 1398.94053 Int. J. Comput. Vis. 114, No. 2-3, 137-167 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{B. Wen} et al., Int. J. Comput. Vis. 114, No. 2--3, 137--167 (2015; Zbl 1398.94053) Full Text: DOI OpenURL
Harandi, Mehrtash; Hartley, Richard; Shen, Chunhua; Lovell, Brian; Sanderson, Conrad Extrinsic methods for coding and dictionary learning on Grassmann manifolds. (English) Zbl 1398.94034 Int. J. Comput. Vis. 114, No. 2-3, 113-136 (2015). MSC: 94A08 68T05 68U05 PDF BibTeX XML Cite \textit{M. Harandi} et al., Int. J. Comput. Vis. 114, No. 2--3, 113--136 (2015; Zbl 1398.94034) Full Text: DOI arXiv Link OpenURL
Xie, Jianwen; Hu, Wenze; Zhu, Song-Chun; Wu, Ying Nian Learning sparse FRAME models for natural image patterns. (English) Zbl 1398.94056 Int. J. Comput. Vis. 114, No. 2-3, 91-112 (2015). MSC: 94A08 68T05 PDF BibTeX XML Cite \textit{J. Xie} et al., Int. J. Comput. Vis. 114, No. 2--3, 91--112 (2015; Zbl 1398.94056) Full Text: DOI OpenURL
Mairal, J. (ed.); Elad, M. (ed.); Bach, F. (ed.) Guest editorial: Sparse coding. (English) Zbl 1398.94011 Int. J. Comput. Vis. 114, No. 2-3, 89-90 (2015). MSC: 94-06 68T05 94A08 00B15 PDF BibTeX XML Cite \textit{J. Mairal} (ed.) et al., Int. J. Comput. Vis. 114, No. 2--3, 89--90 (2015; Zbl 1398.94011) Full Text: DOI OpenURL
Mille, Julien; Bougleux, Sébastien; Cohen, Laurent D. Combination of piecewise-geodesic paths for interactive segmentation. (English) Zbl 1398.68639 Int. J. Comput. Vis. 112, No. 1, 1-22 (2015). MSC: 68U10 68U05 94A08 PDF BibTeX XML Cite \textit{J. Mille} et al., Int. J. Comput. Vis. 112, No. 1, 1--22 (2015; Zbl 1398.68639) Full Text: DOI HAL OpenURL
Kiayias, Aggelos; Oksuz, Ozgur; Tang, Qiang Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications. (English) Zbl 1397.94078 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 548-567 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Kiayias} et al., Lect. Notes Comput. Sci. 9290, 548--567 (2015; Zbl 1397.94078) Full Text: DOI OpenURL
Miele, Andrea; Lenstra, Arjen K. Efficient ephemeral elliptic curve cryptographic keys. (English) Zbl 1397.94091 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 524-547 (2015). MSC: 94A60 11T71 14G50 PDF BibTeX XML Cite \textit{A. Miele} and \textit{A. K. Lenstra}, Lect. Notes Comput. Sci. 9290, 524--547 (2015; Zbl 1397.94091) Full Text: DOI OpenURL
Shi, Yang; Fan, Hongfei On security of a white-box implementation of SHARK. (English) Zbl 1397.94098 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 455-471 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Shi} and \textit{H. Fan}, Lect. Notes Comput. Sci. 9290, 455--471 (2015; Zbl 1397.94098) Full Text: DOI OpenURL
Chenal, Massimo; Tang, Qiang Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes. (English) Zbl 1397.94055 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 397-418 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Chenal} and \textit{Q. Tang}, Lect. Notes Comput. Sci. 9290, 397--418 (2015; Zbl 1397.94055) Full Text: DOI OpenURL
Yu, Wei; Wang, Kunpeng; Li, Bao; He, Xiaoyang; Tian, Song Hashing into Jacobi quartic curves. (English) Zbl 1397.94111 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 355-375 (2015). MSC: 94A60 11T71 14G50 PDF BibTeX XML Cite \textit{W. Yu} et al., Lect. Notes Comput. Sci. 9290, 355--375 (2015; Zbl 1397.94111) Full Text: DOI OpenURL
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav General circuit realizing compact revocable attribute-based encryption from multilinear maps. (English) Zbl 1397.94057 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 336-354 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 9290, 336--354 (2015; Zbl 1397.94057) Full Text: DOI OpenURL
Wang, Zhiwei; Yiu, Siu Ming CCA secure PKE with auxiliary input security and leakage resiliency. (English) Zbl 1397.94107 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 319-335 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Wang} and \textit{S. M. Yiu}, Lect. Notes Comput. Sci. 9290, 319--335 (2015; Zbl 1397.94107) Full Text: DOI OpenURL
Lancrenon, Jean; Škrobot, Marjan On the provable security of the Dragonfly protocol. (English) Zbl 1397.94083 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 244-261 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{J. Lancrenon} and \textit{M. Škrobot}, Lect. Notes Comput. Sci. 9290, 244--261 (2015; Zbl 1397.94083) Full Text: DOI Link OpenURL
Draper-Gil, Gerard; Ferrer-Gomila, Josep-Lluís; Hinarejos, M. Francisca; Zhou, Jianying On the efficiency of multi-party contract signing protocols. (English) Zbl 1397.94059 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 227-243 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{G. Draper-Gil} et al., Lect. Notes Comput. Sci. 9290, 227--243 (2015; Zbl 1397.94059) Full Text: DOI OpenURL
Debnath, Sumit Kumar; Dutta, Ratna Secure and efficient private set intersection cardinality using Bloom filter. (English) Zbl 1397.94058 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 209-226 (2015). MSC: 94A60 68P25 94A62 PDF BibTeX XML Cite \textit{S. K. Debnath} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 9290, 209--226 (2015; Zbl 1397.94058) Full Text: DOI OpenURL
Kiefer, Franziskus; Manulis, Mark Oblivious PAKE: efficient handling of password trials. (English) Zbl 1397.94080 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 191-208 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{F. Kiefer} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 9290, 191--208 (2015; Zbl 1397.94080) Full Text: DOI OpenURL
Karpman, Pierre From distinguishers to key recovery: improved related-key attacks on Even-Mansour. (English) Zbl 1397.94077 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 177-188 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Karpman}, Lect. Notes Comput. Sci. 9290, 177--188 (2015; Zbl 1397.94077) Full Text: DOI OpenURL
Yao, Yuan; Zhang, Bin; Wu, Wenling Automatic search for linear trails of the SPECK family. (English) Zbl 1397.94110 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 158-176 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Yao} et al., Lect. Notes Comput. Sci. 9290, 158--176 (2015; Zbl 1397.94110) Full Text: DOI OpenURL
Sun, Siwei; Hu, Lei; Wang, Meiqin; Yang, Qianqian; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling; Shan, Jinyong Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis. (English) Zbl 1397.94099 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 141-157 (2015). MSC: 94A60 90C11 PDF BibTeX XML Cite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 9290, 141--157 (2015; Zbl 1397.94099) Full Text: DOI OpenURL
Kiayias, Aggelos; Osmanoglu, Murat; Tang, Qiang Graded signatures. (English) Zbl 1397.94115 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 61-80 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{A. Kiayias} et al., Lect. Notes Comput. Sci. 9290, 61--80 (2015; Zbl 1397.94115) Full Text: DOI OpenURL
Wang, Fuqun; Wang, Kunpeng; Li, Bao; Gao, Yuanyuan Leveled strongly-unforgeable identity-based fully homomorphic signatures. (English) Zbl 1397.94106 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 42-60 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{F. Wang} et al., Lect. Notes Comput. Sci. 9290, 42--60 (2015; Zbl 1397.94106) Full Text: DOI OpenURL
Liang, Bei; Li, Hongda; Chang, Jinyong The generic transformation from standard signatures to identity-based aggregate signatures. (English) Zbl 1397.94085 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 21-41 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{B. Liang} et al., Lect. Notes Comput. Sci. 9290, 21--41 (2015; Zbl 1397.94085) Full Text: DOI OpenURL
Fukumitsu, Masayuki; Hasegawa, Shingo Black-box separations on Fiat-Shamir-type signatures in the non-programmable random oracle model. (English) Zbl 1397.94063 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 3-20 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. Fukumitsu} and \textit{S. Hasegawa}, Lect. Notes Comput. Sci. 9290, 3--20 (2015; Zbl 1397.94063) Full Text: DOI OpenURL
Alexander, James; Hearding, Paul A graph-theoretic encoding of Lucas sequences. (English) Zbl 1397.05079 Fibonacci Q. 53, No. 3, 237-240 (2015). MSC: 05C30 11B39 11T06 PDF BibTeX XML Cite \textit{J. Alexander} and \textit{P. Hearding}, Fibonacci Q. 53, No. 3, 237--240 (2015; Zbl 1397.05079) Full Text: arXiv Link OpenURL
Hamlin, Nathan; Krishnamoorthy, Bala; Webb, William A knapsack-like code using recurrence sequence representations. (English) Zbl 1396.94081 Fibonacci Q. 53, No. 1, 24-33 (2015). MSC: 94A60 11B37 11Y55 PDF BibTeX XML Cite \textit{N. Hamlin} et al., Fibonacci Q. 53, No. 1, 24--33 (2015; Zbl 1396.94081) Full Text: arXiv Link OpenURL
Aguiar, V.; Guedes, I. Shannon entropy, Fisher information and uncertainty relations for log-periodic oscillators. (English) Zbl 1395.82019 Physica A 423, 72-79 (2015). MSC: 82B10 94A17 34C15 PDF BibTeX XML Cite \textit{V. Aguiar} and \textit{I. Guedes}, Physica A 423, 72--79 (2015; Zbl 1395.82019) Full Text: DOI OpenURL
Zhou, Bingchang; McDonnell, Mark D. Optimising threshold levels for information transmission in binary threshold networks: independent multiplicative noise on each threshold. (English) Zbl 1395.94205 Physica A 419, 659-667 (2015). MSC: 94A15 PDF BibTeX XML Cite \textit{B. Zhou} and \textit{M. D. McDonnell}, Physica A 419, 659--667 (2015; Zbl 1395.94205) Full Text: DOI OpenURL
Thapliyal, Richa; Taneja, H. C.; Kumar, Vikas Characterization results based on non-additive entropy of order statistics. (English) Zbl 1395.62009 Physica A 417, 297-303 (2015). MSC: 62B10 94A17 62G30 PDF BibTeX XML Cite \textit{R. Thapliyal} et al., Physica A 417, 297--303 (2015; Zbl 1395.62009) Full Text: DOI OpenURL
Jardim, Sandra V. B. Sparse and robust signal reconstruction. (English) Zbl 1401.94039 Theory Appl. Math. Comput. Sci. 5, No. 1, 1-19 (2015). MSC: 94A12 94A08 PDF BibTeX XML Cite \textit{S. V. B. Jardim}, Theory Appl. Math. Comput. Sci. 5, No. 1, 1--19 (2015; Zbl 1401.94039) OpenURL
Fimmel, Elena; Strüngmann, Lutz On the hierarchy of trinucleotide \(n\)-circular codes and their corresponding amino acids. (English) Zbl 1405.92170 J. Theor. Biol. 364, 113-120 (2015). MSC: 92D10 92C40 94A45 PDF BibTeX XML Cite \textit{E. Fimmel} and \textit{L. Strüngmann}, J. Theor. Biol. 364, 113--120 (2015; Zbl 1405.92170) Full Text: DOI OpenURL
Guo, Hongzhi; Sun, Zhi; Sun, Jingbo; Litchinitser, Natalia M. \(\mathrm{M}^2I\): channel modeling for metamaterial-enhanced magnetic induction communications. (English) Zbl 1395.78051 IEEE Trans. Antennas Propag. 63, No. 11, 5072-5087 (2015). MSC: 78A48 94A40 PDF BibTeX XML Cite \textit{H. Guo} et al., IEEE Trans. Antennas Propag. 63, No. 11, 5072--5087 (2015; Zbl 1395.78051) Full Text: DOI arXiv OpenURL
Laheurte, Jean Marc; Protat, Stéphane; Louzir, Ali Performance analysis of UHF RFID tags dedicated to power supply cords. (English) Zbl 1395.94128 IEEE Trans. Antennas Propag. 63, No. 11, 5241-5245 (2015). MSC: 94A12 PDF BibTeX XML Cite \textit{J. M. Laheurte} et al., IEEE Trans. Antennas Propag. 63, No. 11, 5241--5245 (2015; Zbl 1395.94128) Full Text: DOI OpenURL
Córcoles, Juan Reactively loaded array pattern synthesis as a quadratically constrained quadratic program. (English) Zbl 1395.94097 IEEE Trans. Antennas Propag. 63, No. 11, 5219-5224 (2015). MSC: 94A12 90C20 PDF BibTeX XML Cite \textit{J. Córcoles}, IEEE Trans. Antennas Propag. 63, No. 11, 5219--5224 (2015; Zbl 1395.94097) Full Text: DOI OpenURL
Di Palma, Luca; Clemente, Antonio; Dussopt, Laurent; Sauleau, Ronan; Potier, Patrick; Pouliguen, Philippe Circularly polarized transmitarray with sequential rotation in Ka-band. (English) Zbl 1395.94101 IEEE Trans. Antennas Propag. 63, No. 11, 5118-5124 (2015). MSC: 94A12 PDF BibTeX XML Cite \textit{L. Di Palma} et al., IEEE Trans. Antennas Propag. 63, No. 11, 5118--5124 (2015; Zbl 1395.94101) Full Text: DOI OpenURL
Leonor, Nuno R.; Caldeirinha, Rafael F. S.; Fernandes, Telmo R.; Sánchez, Manuel García A simple model for average reradiation patterns of single trees based on weighted regression at 60 GHz. (English) Zbl 1395.94131 IEEE Trans. Antennas Propag. 63, No. 11, 5113-5118 (2015). MSC: 94A12 PDF BibTeX XML Cite \textit{N. R. Leonor} et al., IEEE Trans. Antennas Propag. 63, No. 11, 5113--5118 (2015; Zbl 1395.94131) Full Text: DOI OpenURL
Perez, Richard; Das, Nirod K. Leaky wave radiation in a linear array of capacitively loaded conducting loops. (English) Zbl 1395.94152 IEEE Trans. Antennas Propag. 63, No. 11, 5093-5097 (2015). MSC: 94A12 PDF BibTeX XML Cite \textit{R. Perez} and \textit{N. K. Das}, IEEE Trans. Antennas Propag. 63, No. 11, 5093--5097 (2015; Zbl 1395.94152) Full Text: DOI OpenURL
Anbaran, Armin Ghorssi; Mohammadi, Abbas; Abdipour, Abdolali Capacity enhancement of ad hoc networks using a new single-RF compact beamforming scheme. (English) Zbl 1395.90057 IEEE Trans. Antennas Propag. 63, No. 11, 5026-5034 (2015). MSC: 90B18 94A12 PDF BibTeX XML Cite \textit{A. G. Anbaran} et al., IEEE Trans. Antennas Propag. 63, No. 11, 5026--5034 (2015; Zbl 1395.90057) Full Text: DOI OpenURL