default search action
ISPEC 2012: Hangzhou, China
- Mark Dermot Ryan, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5
Digital Signatures
- Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
A Pre-computable Signature Scheme with Efficient Verification for RFID. 1-16 - Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
Redactable Signatures for Independent Removal of Structure and Content. 17-33
Public Key Cryptography
- Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. 34-45 - Chong-zhi Gao, Dongqing Xie, Baodian Wei:
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. 46-62 - Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada:
Computational Soundness of Indistinguishability Properties without Computable Parsing. 63-79
Cryptanalysis I: Differential Attacks
- Dongxia Bai, Leibo Li:
New Impossible Differential Attacks on Camellia. 80-96 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Impossible Differential Attacks on Reduced-Round LBlock. 97-108 - Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. 109-125
Applications I.i: Oblivious Transfer
- Christian L. F. Corniaux, Hossein Ghodosi:
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings. 126-143 - K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. 144-157
Applications I.ii: Internet Security (Works-in-Progress)
- Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang:
Towards Fine-Grained Access Control on Browser Extensions. 158-169 - Yang-Wai Chow, Willy Susilo:
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. 170-181
Key Management
- Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. 182-198 - Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson:
A Framework for Security Analysis of Key Derivation Functions. 199-216
Applied Cryptography
- Teng Guo, Feng Liu, Chuan Kun Wu:
On the Equivalence of Two Definitions of Visual Cryptography Scheme. 217-227 - Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. 228-244 - Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote:
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. 245-258
Applications II.i: PINs
- Johannes Braun, Moritz Horsch, Alexander Wiesmaier:
iPIN and mTAN for Secure eID Applications. 259-276
Applications II.ii: Fundamentals (Works-in-Progress)
- Manuel Liedel:
Secure Distributed Computation of the Square Root and Applications. 277-288 - Shuo Tian, Yeping He, Baozeng Ding:
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. 289-300
Cryptanalysis II: Fault Attacks and Key Recovery
- Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert:
Structure-Based RSA Fault Attacks. 301-318 - Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. 319-336 - Yanfeng Wang, Wenling Wu, Xiaoli Yu:
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. 337-352 - Zhenfei Zhang, Thomas Plantard, Willy Susilo:
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. 353-368
Cryptanalysis III: Key Recovery (Works-in-Progress)
- Marc Joye, Tancrède Lepoint:
Partial Key Exposure on RSA with Private Exponents Larger Than N. 369-380 - Yue Sun, Meiqin Wang:
Linear Cryptanalysis of Reduced-Round ICEBERG. 381-392 - An Wang, Man Chen, Zongyue Wang, Yaoling Ding:
Overcoming Significant Noise: Correlation-Template-Induction Attack. 393-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.