default search action
Inscrypt 2010: Shanghai, China
- Xuejia Lai, Moti Yung, Dongdai Lin:
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6584, Springer 2011, ISBN 978-3-642-21517-9
Encryption Schemes
- Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. 1-17 - Helger Lipmaa:
On the CCA1-Security of Elgamal and Damgård's Elgamal. 18-35 - Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Online/Offline Identity-Based Signcryption Revisited. 36-51 - Huafei Zhu, Feng Bao:
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. 52-61
Stream Ciphers, Sequences and Elliptic Curves
- Jiageng Chen, Atsuko Miyaji:
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. 62-76 - Sourav Das, Dipanwita Roy Chowdhury:
An Efficient, Parameterized and Scalable S-box for Stream Ciphers. 77-94 - Zhixiong Chen, Xiangguo Cheng, Chenhuang Wu:
A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse. 95-104 - Zhi Hu, Maozhi Xu, Zhenghua Zhou:
A Generalization of Verheul's Theorem for Some Ordinary Curves. 105-114
Secure Computing
- Zhanfei Zhou:
On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes. 115-124 - Paolo Palmieri, Olivier Pereira:
Building Oblivious Transfer on Channel Delays. 125-138
Hash Functions
- Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen:
Variants of Multicollision Attacks on Iterated Hash Functions. 139-154 - Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. 155-168 - Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. 169-186 - Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. 187-198 - Gaoli Wang:
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}. 199-217
Key Management
- Weijia Wang, Lei Hu, Yong Li:
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. 218-235 - Yvo Desmedt, Atsuko Miyaji:
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. 236-254 - Ying Liu, Fushan Wei, Chuangui Ma:
Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting. 255-267 - Zheng Gong, Qiang Tang, Yee Wei Law, Hongyang Chen:
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. 268-283 - Qi Chen, Dingyi Pei, Jun-Wu Dong:
Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. 284-299
Digital Signatures
- Junqing Gong, Haifeng Qian, Yuan Zhou:
Fully-Secure and Practical Sanitizable Signatures. 300-317 - Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta:
Rigorous Security Requirements for Designated Verifier Signatures. 318-335 - Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr:
Quasi-Dyadic CFS Signatures. 336-349 - Yilian Zhang, Zhide Chen, Fuchun Guo:
Online/Offline Verification of Short Signatures. 350-358
Privacy and Algebraic Cryptanalysis
- Rui Zhang:
Acquiring Key Privacy from Data Privacy. 359-372 - Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. 373-386 - Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret:
Algebraic Precomputations in Differential and Integral Cryptanalysis. 387-403 - Qichun Wang, Thomas Johansson:
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. 404-414
Hashing and Authentication
- Xiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding:
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. 415-426 - Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. 427-442 - Shaoquan Jiang:
Dwork-Naor ZAP and Its Application in Deniable Authentication, Revisited. 443-454
Hardware and Software Issues
- Fuchun Guo, Yi Mu, Willy Susilo:
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. 455-470 - Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette:
Characterization of the Electromagnetic Side Channel in Frequency Domain. 471-486 - Ning Ding, Dawu Gu:
On Obfuscating Programs with Tamper-proof Hardware. 487-502 - Yi Yang, Lingyun Ying, Rui Wang, Purui Su, Dengguo Feng:
DepSim: A Dependency-Based Malware Similarity Comparison System. 503-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.