default search action
Inscrypt 2011: Beijing, China
- Chuankun Wu, Moti Yung, Dongdai Lin:
Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7537, Springer 2012, ISBN 978-3-642-34703-0 - Benoît Libert, Moti Yung:
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems. 1-21 - Phong Q. Nguyen:
Cryptanalysis vs. Provable Security. 22-23 - Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas:
Boosting Scalability in Anomaly-Based Packed Executable Filtering. 24-43 - Lin Wang, Bing Shen, TongXu Qiao:
Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs. 44-56 - Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel:
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. 57-76 - Zhengjun Cao, Qian Sha, Xiao Fan:
Adleman-Manders-Miller Root Extraction Method Revisited. 77-85 - Teng Guo, Feng Liu, Chuan Kun Wu:
Multi-pixel Encryption Visual Cryptography. 86-92 - Yi-Ning Liu, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao:
An Improved Electronic Voting Scheme without a Trusted Random Number Generator. 93-101 - Jiang Weng, Yunqi Dou, Chuangui Ma, Nadia El Mrabet:
Fault Attacks against the Miller Algorithm in Hessian Coordinates. 102-112 - Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. 113-130 - Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Tradeoff between Encapsulation and Decapsulation of HK09. 131-141 - Haibo Tian, Xiaofeng Chen, Zhengtao Jiang:
Non-interactive Deniable Authentication Protocols. 142-159 - Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng:
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3. 160-178 - Nan Li, Yi Mu, Willy Susilo:
Efficient Self-certified Signatures with Batch Verification. 179-194 - Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. 195-209 - Xusheng Zhang, Shan Chen, Dongdai Lin:
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves. 210-226 - Yibin Dai, Shao-zhen Chen:
Weak-Key Class of MISTY1 for Related-Key Differential Attack. 227-236 - Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang:
Cryptanalysis of Reduced-Round KLEIN Block Cipher. 237-250 - Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu:
An Efficient RSA Implementation without Precomputation. 251-268 - Gautham Sekar:
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. 269-288 - Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura:
Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. 289-308 - Jian Zhou, Ji Xiang, Neng Gao:
Towards Attack Resilient Social Network Based Threshold Signing. 309-323 - Jiang Zhang, Zhenfeng Zhang:
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. 324-340 - Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. 341-362 - Guifang Huang, Lei Hu:
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function. 363-378 - Chenggen Song, Maozhi Xu, Chunming Tang:
Pseudorandom Generators Based on Subcovers for Finite Groups. 379-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.