default search action
Inscrypt 2009: Beijing, China
- Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8
Cryptanalysis
- Ping Li, Bing Sun, Chao Li:
Integral Cryptanalysis of ARIA. 1-14 - Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel:
Cryptanalysis of the ESSENCE Family of Hash Functions. 15-34 - Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li:
Differential-Multiple Linear Cryptanalysis. 35-49 - Jiqiang Lu:
Differential Attack on Five Rounds of the SC2000 Block Cipher. 50-59
Signature and Signcryption
- Wei Zhao, Dingfeng Ye:
Pairing-Based Nominative Signatures with Selective and Universal Convertibility. 60-74 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. 75-92 - Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan:
Sanitizable Signatures with Strong Transparency in the Standard Model. 93-107 - S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan:
Breaking and Building of Threshold Signcryption Schemes. 108-123
Key Exchange
- Fengjiao Wang, Yuqing Zhang:
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption. 124-133 - Zhigang Gao, Dengguo Feng:
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network. 134-143 - Xuexian Hu, Wenfen Liu:
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. 144-153
Private Computations
- Helger Lipmaa, Bingsheng Zhang:
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. 154-163 - Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu:
Optionally Identifiable Private Handshakes. 164-178 - Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience. 179-197
Cipher Design and Analysis
- Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang:
Gemstone: A New Stream Cipher Using Coupled Map Lattice. 198-214 - Lei Zhang, Wenling Wu, Liting Zhang:
Proposition of Two Cipher Structures. 215-229 - Deian Stefan:
Hardware Framework for the Rabbit Stream Cipher. 230-247 - Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Linearity within the SMS4 Block Cipher. 248-265 - Jean-Charles Faugère, Ludovic Perret:
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages. 266-277
Public Key Cryptography
- Xianmeng Meng, Jingguo Bi:
Weak Keys in RSA with Primes Sharing Least Significant Bits. 278-287 - Takeo Mizuno, Hiroshi Doi:
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption. 288-302 - Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. 303-312
Network and System Security
- Xiaofeng Nie, Jiwu Jing, Yuewu Wang:
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. 313-323 - Feng Cheng, Sebastian Roschke, Robert Schuppenies, Christoph Meinel:
Remodeling Vulnerability Information. 324-336 - Elie Bursztein, John C. Mitchell:
Using Strategy Objectives for Network Security Analysis. 337-349
Hardware Security
- Liqun Chen:
A DAA Scheme Requiring Less TPM Resources. 350-365 - Johann Großschädl:
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags. 366-382 - Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. 383-392 - Mathieu Renauld, François-Xavier Standaert:
Algebraic Side-Channel Attacks. 393-410
Web Security
- Le Kang, Ji Xiang:
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing. 411-425 - Saba Jalal, Brian King:
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents. 426-442 - Sean Policarpio, Yan Zhang:
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints. 443-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.