default search action
14th Inscrypt 2018: Fuzhou, China
- Fuchun Guo, Xinyi Huang, Moti Yung:
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11449, Springer 2019, ISBN 978-3-030-14233-9
Invited Paper
- Zhaohui Cheng:
Security Analysis of SM9 Key Agreement and Encryption. 3-25
Blockchain and Crypto Currency
- Runchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang:
Evaluating CryptoNote-Style Blockchains. 29-48 - Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. 49-69 - Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. 70-85 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. 86-100 - Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. 101-114
Lattice-Based Cryptology
- Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. 117-137 - Zengpeng Li, Ding Wang:
Two-Round PAKE Protocol over Lattices Without NIZK. 138-159
Symmetric Cryptology
- Shi Wang, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
Improved Integral Attacks on PRESENT-80. 163-182 - Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang:
Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128. 183-199 - Kamel Ammour, Lei Wang:
Improved Indifferentiability Security Bound for the Prefix-Free Merkle-Damgård Hash Function. 200-219
Applied Cryptography
- Dengzhi Liu, Jian Shen, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. 223-239 - Mingwu Zhang, Yan Jiang, Hua Shen, Bingbing Li, Willy Susilo:
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation. 240-259 - Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. 260-273 - Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam, Xun Yi:
Using Blockchain to Control Access to Cloud Data. 274-288 - Randolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun:
A Multi-client DSSE Scheme Supporting Range Queries. 289-307 - Haixia Chen, Shangpeng Wang, Hongyan Zhang, Wei Wu:
Image Authentication for Permissible Cropping. 308-325
Information Security
- Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song:
Chord: Thwarting Relay Attacks Among Near Field Communications. 329-348 - Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. 349-369 - Xudong Zhu, Hui Li, Yang Yu:
Blockchain-Based Privacy Preserving Deep Learning. 370-383 - Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, Dandan Xu:
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. 384-403 - Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang:
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. 404-423
Asymmetric Encryption
- Chuangui Ma, Aijun Ge, Jie Zhang:
Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model. 427-447 - Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. 448-467 - Mriganka Mandal, Ratna Dutta:
Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework. 468-489 - Jingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh:
Attribute-Based Encryption with Efficient Keyword Search and User Revocation. 490-509 - Dali Zhu, Renjun Zhang, Shuang Hu, Gongliang Chen:
Public-Key Encryption with Selective Opening Security from General Assumptions. 510-530
Foundations
- Eloi de Chérisey, Sylvain Guilley, Olivier Rioul:
Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR. 533-553 - Guiwen Luo, Xiao Chen:
Searching BN Curves for SM9. 554-567 - Qun-Xiong Zheng, Dongdai Lin, Wen-Feng Qi:
Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers. 568-585 - Jingyue Yu:
Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness Encryption. 586-606 - Shuai Li, Bin Hu:
Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHE. 607-617
Short Papers
- Dingyi Pei, Jingang Liu:
A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme. 621-625 - Jinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du:
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing. 626-636 - Yuan Wang, Liming Wang, Zhen Xu, Wei An:
Understanding User Behavior in Online Banking System. 637-646 - Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. 647-657 - Masatsugu Oya, Kazumasa Omote:
Early Detection of Remote Access Trojan by Software Network Behavior. 658-671
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.