default search action
Inscrypt 2017: Beijing, China
- Xiaofeng Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7
Keynote Speeches
- Elisa Bertino:
Security and Privacy in the IoT. 3-10 - Miroslaw Kutylowski:
On Crossroads of Privacy Protection. 11-20 - Kui Ren:
The Dual Role of Smartphones in IoT Security. 21-24
Cryptographic Protocols and Algorithms
- Zheng Zhang, Fangguo Zhang, Huang Zhang:
Implementing Indistinguishability Obfuscation Using GGH15. 27-43 - Jingyue Yu, Yi Deng, Yu Chen:
From Attack on Feige-Shamir to Construction of Oblivious Transfer. 44-64 - Ping Wang, DongDong Shang:
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing. 65-80 - Haibo Tian, Liqing Fu, Jiejie He:
A Simpler Bitcoin Voting Protocol. 81-98 - Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. 99-116 - Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Twisted Jacobi Intersection Curves. 117-138
Digital Signatures
- Nobuaki Kitajima, Naoto Yanai, Takashi Nishide:
Identity-Based Key-Insulated Aggregate Signatures, Revisited. 141-156 - Sudhakar Kumawat, Souradyuti Paul:
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles. 157-179 - Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, Ru Meng:
A Universal Designated Multi-Verifier Transitive Signature Scheme. 180-195 - Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. 196-208
Encryption
- Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. 211-222 - Geng Wang, Xiao Zhang, Yanmei Li:
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). 223-241 - Liquan Chen, Ming Kim Lim, Muyang Wang:
Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing. 242-259 - Biao Wang, Xueqing Wang, Rui Xue:
Leveled FHE with Matrix Message Space. 260-277 - Hanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. 278-298
Cryptanalysis and Attack
- Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. 301-320 - Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou:
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs. 321-341 - Xiaojuan Zhang, Dongdai Lin:
Cryptanalysis of Acorn in Nonce-Reuse Setting. 342-361 - Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang:
An Improved Method to Unveil Malware's Hidden Behavior. 362-382 - Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. 383-403 - Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, Fushan Wei:
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling. 404-426 - Yuanhao Deng, Chenhui Jin, Rongjia Li:
Meet in the Middle Attack on Type-1 Feistel Construction. 427-444
Applications
- Chujiao Ma, John A. Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz:
Influence of Error on Hamming Weights for ASCA. 447-460 - Xiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song:
State-of-the-Art: Security Competition in Talent Education. 461-481 - Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, Siyun Yan:
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. 482-499 - Chonghua Wang, Zhiyu Hao, Xiaochun Yun:
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment. 500-517 - Shanding Xu, Xiwang Cao, Chunming Tang:
A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes. 518-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.