default search action
Inscrypt 2015: Beijing, China
- Dongdai Lin, XiaoFeng Wang, Moti Yung:
Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9589, Springer 2016, ISBN 978-3-319-38897-7
Hash Function
- Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes. 3-21 - Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Generalized Huff Curves. 22-44
Signature Schemes
- Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu:
Cubic Unbalance Oil and Vinegar Signature Scheme. 47-56 - Yang Tan, Shaohua Tang:
Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation. 57-74 - Wenbin Zhang, Chik How Tan:
A Secure Variant of Yasuda, Takagi and Sakurai's Signature Scheme. 75-89
Symmetric Ciphers
- Stian Fauskanger, Igor A. Semaev:
Statistical and Algebraic Properties of DES. 93-107 - Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. 108-124 - Ling Sun, Kai Fu, Meiqin Wang:
Improved Zero-Correlation Cryptanalysis on SIMON. 125-143 - Ling Cheng, Wentao Zhang, Zejun Xiang:
A New Cryptographic Analysis of 4-bit S-Boxes. 144-164
Elipptic Curve and Cryptographic Fundamentals
- Jincheng Zhuang, Qi Cheng:
On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). 167-177 - Xiaona Zhang, Li-Ping Wang, Jun Xu, Lei Hu, Liqiang Peng, Zhangjie Huang, Zeyi Liu:
Recovering a Sum of Two Squares Decomposition Revisited. 178-192 - Weixuan Li, Wei Yu, Kunpeng Wang:
Improved Tripling on Elliptic Curves. 193-205
Web and Application Security
- Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue:
An Approach for Mitigating Potential Threats in Practical SSO Systems. 209-226 - Yi Tang, Manjia Lin:
EQPO: Obscuring Encrypted Web Traffic with Equal-Sized Pseudo-Objects. 227-245 - Xiangjun Wu, Haibin Kan:
A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences. 246-259 - Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. 260-279
Cloud Security
- Huaqun Wang, Debiao He:
Proxy Provable Data Possession with General Access Structure in Public Clouds. 283-300 - Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu:
A Provable Data Possession Scheme with Data Hierarchy in Cloud. 301-321 - Shiwei Zhang, Yi Mu, Guomin Yang:
Threshold Broadcast Encryption with Keyword Search. 322-337
Key Management and Public Key Encryption
- Jian Liu, Sihem Mesnager, Lusheng Chen:
Secret Sharing Schemes with General Access Structures. 341-360 - Xiaochao Sun, Bao Li, Xianhui Lu, Fuyang Fang:
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling. 361-378
Zero Knowledge and Secure Computations
- Houda Ferradi, Rémi Géraud, David Naccache:
Slow Motion Zero Knowledge Identifying with Colliding Commitments. 381-396 - Peili Li, Haixia Xu, Yuanyuan Ji:
Multi-client Outsourced Computation. 397-409
Software and Mobile Security
- Jan Hajny, Petr Dzurenda, Lukas Malina:
Privacy-Enhanced Data Collection Scheme for Smart-Metering. 413-429 - Manuel Huber, Julian Horsch, Michael Velten, Michael Weiß, Sascha Wessel:
A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. 430-450 - Daiyong Quan, Lihua Yin, Yunchuan Guo:
Assessing the Disclosure of User Profile in Mobile-Aware Services. 451-467 - Fatih Kiliç, Hannes Laner, Claudia Eckert:
Interactive Function Identification Decreasing the Effort of Reverse Engineering. 468-487
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.