default search action
Inscrypt 2007: Xining, China
- Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu:
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4990, Springer 2008, ISBN 978-3-540-79498-1
Invited Talks
- Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme. 1-4 - Moti Yung:
On the Evolution of User Authentication: Non-bilateral Factors. 5-10
Digital Signature Schemes
- Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. 11-24 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. 25-39 - Chunxiang Gu, Yuefei Zhu:
An Efficient ID-Based Proxy Signature Scheme from Pairings. 40-50
Block Cipher
- Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. 51-65 - Andrey Bogdanov:
Linear Slide Attacks on the KeeLoq Block Cipher. 66-80
Key Management
- Jun-Wu Dong, Dingyi Pei, Xueli Wang:
A Key Predistribution Scheme Based on 3-Designs. 81-92 - Weijia Wang, Lei Hu, Yong Li:
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. 93-107 - Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis:
A Provably Secure One-Pass Two-Party Key Establishment Protocol. 108-122
Zero Knowledge and Secure Computation Protocols
- Yi Deng, Dongdai Lin:
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. 123-137 - Marc Mouffron, Frederic Rousseau, Huafei Zhu:
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. 138-152 - Ning Ding, Dawu Gu:
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. 153-166
Secret Sharing
- Christophe Tartary, Josef Pieprzyk, Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. 167-181 - Chuangui Ma, Rui Cheng:
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. 182-191 - Daoshun Wang, Xiaobo Li, Feng Yi:
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. 192-200
Stream Cipher and Pseudorandomness
- Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert:
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. 201-215 - Jin-Song Wang, Wen-Feng Qi:
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. 216-230 - Zhixiong Chen, Ning Zhang, Guozhen Xiao:
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. 231-245 - Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. 246-255
Boolean Functions
- Jin-Song Wang, Wen-Feng Qi:
Linear Equation on Polynomial Single Cycle T-Functions. 256-270 - Longjiang Qu, Chao Li:
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. 271-282
Privacy and Deniability
- Jacek Cichon, Miroslaw Kutylowski:
Anonymity and k-Choice Identities. 283-297 - Shaoquan Jiang:
Deniable Authentication on the Internet. 298-312 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. 313-327 - Sujing Zhou, Dongdai Lin:
Unlinkable Randomizable Signature and Its Application in Group Signature. 328-342
Hash Functions
- Shiwei Chen, Chenhui Jin:
An Improved Collision Attack on MD5 Algorithm. 343-357 - Jintai Ding, Bo-Yin Yang:
Multivariates Polynomials for Hashing. 358-371
Public Key Cryptosystems
- Chunxiang Gu, Yuefei Zhu, Heng Pan:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. 372-383 - Fuchun Guo, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. 384-398
Public Key Analysis
- Xin Jiang, Jintai Ding, Lei Hu:
Kipnis-Shamir Attack on HFE Revisited. 399-411 - Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai:
Cryptanalysis of General Lu-Lee Type Systems. 412-426 - Adam L. Young, Moti Yung:
A Timing-Resistant Elliptic Curve Backdoor in RSA. 427-441
Application Security
- Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang, Zan Li, Kai Fan:
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. 442-456 - Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. 457-462
Systems Security and Trusted Computing
- Jing Zhan, Huanguo Zhang, Fei Yan:
Building Trusted Sub-domain for the Grid with Trusted Computing. 463-471 - Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. 472-481 - Yang Xiang, Qiang Li:
Online Tracing Scanning Worm with Sliding Window. 482-496
Network Security
- Junfeng Tian, Ning Li:
A New Proactive Defense Model Based on Intrusion Deception and Traceback. 497-506 - Fouz Sattar, Muid Mufti:
On Modeling Post Decryption Error Processes in UMTS Air Interface. 507-516 - Feng Cheng, Christian Wolter, Christoph Meinel:
A Simple, Smart and Extensible Framework for Network Security Measurement. 517-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.