default search action
18th Inscrypt 2022: Beijing, China
- Yi Deng, Moti Yung:
Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13837, Springer 2023, ISBN 978-3-031-26552-5
Block Ciphers
- Xin Miao, Chun Guo, Meiqin Wang, Weijia Wang:
How Fast Can SM4 be in Software? 3-22 - Lei Zhang, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu:
LLLWBC: A New Low-Latency Light-Weight Block Cipher. 23-42 - Weiwei Cao, Wentao Zhang, Chunning Zhou:
New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits. 43-63
Public Key Encryption & Signature
- Min Zhang, Binbin Tu, Yu Chen:
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature. 67-86 - Wenqiu Ma, Rui Zhang:
SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications. 87-107 - Wenshuo Guo, Fangwei Fu:
McEliece-Type Encryption Based on Gabidulin Codes with No Hidden Structure. 108-126
Quantum
- Chengkai Zhu, Zhenyu Huang:
Optimizing the Depth of Quantum Implementations of Linear Layers. 129-147 - Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:
IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. 148-166
MPC
- You Chen, Ning Ding, Dawu Gu, Yang Bian:
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion. 169-191 - Cong Zhang, Shuaishuai Li, Dongdai Lin:
Amortizing Division and Exponentiation. 192-210
Cryptanalysis
- Chenmeng Li, Baofeng Wu, Dongdai Lin:
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT. 213-233 - Lulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin:
Cryptanalysis of Ciminion. 234-251 - Tianyou Ding, Wentao Zhang, Chunning Zhou:
Clustering Effect of Iterative Differential and Linear Trails. 252-271 - Qingyuan Yu, Keting Jia, Guangnan Zou, Guoyan Zhang:
Differential Cryptanalysis of Round-Reduced SPEEDY Family. 272-291
Mathematical Aspects of Crypto
- Luying Li, Wei Yu:
A Note on Inverted Twisted Edwards Curve. 295-304 - Xiao Li, Wei Yu, Yuqing Zhu, Zhizhong Pan:
Efficiently Computable Complex Multiplication of Elliptic Curves. 305-317 - Yanan Wu, Nian Li, Xiangyong Zeng, Yuhua Cai:
Several Classes of Niho Type Boolean Functions with Few Walsh Transform Values. 318-333
Stream Ciphers
- Bohan Li, Hailong Zhang, Dongdai Lin:
Higher-Order Masking Scheme for Trivium Hardware Implementation. 337-356 - Cheng Che, Tian Tian:
An Experimentally Verified Attack on 820-Round Trivium. 357-369
Malware
- Yunfan Li, Lingjing Yu, Qingyun Liu:
HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification. 373-390 - Qintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen, Yuqing Zhang:
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns. 391-407 - Qi Wang, Wenxin Li, Kang Yang, Yiru Zhao, Lei Zhao, Lina Wang:
Efficient DNN Backdoor Detection Guided by Static Weight Analysis. 408-428 - Jing Li, Sisi Zhang, Xingbin Wang, Rui Hou:
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans. 429-444
Lattices
- Zhili Dong, Shixin Tian, Kunpeng Wang, Chang Lv:
Subfield Attacks on HSVP in Ideal Lattices. 447-462 - Zishen Zhao, Guangwu Xu:
On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices. 463-482 - Jing Gao, Jun Xu, Lei Hu:
Inferring Sequences Produced by the Quadratic Generator. 483-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.