default search action
16th Inscrypt 2020: Guangzhou, China
- Yongdong Wu, Moti Yung:
Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12612, Springer 2021, ISBN 978-3-030-71851-0
AI Security
- Heng-Chuan Su, Xuan-Yong Zhu, Duan Ming:
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning. 3-20 - Jinyin Chen, Changan Wu, Shijing Shen, Xuhong Zhang, Jianhao Chen:
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation. 21-36 - Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. 37-52 - Zhaojie Chen, Puxi Lin, Zoe Lin Jiang, Zhanhang Wei, Sichen Yuan, Junbin Fang:
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System. 53-69
Asymmetric Cipher
- Yanyan Liu, Yiru Sun:
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption. 73-82 - Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. 83-103 - Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
An Efficient CCA-Secure Access Control Encryption for Any Policy. 104-112 - Rui Zhang, Huan Zou, Cong Zhang, Yuting Xiao, Yang Tao:
Distributed Key Generation for SM9-Based Systems. 113-129
Post-quantum Crypto
- Kelly Yun, Rui Xue:
Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors Assumption. 133-147 - Xuejun Fan, Song Tian, Xiu Xu, Bao Li:
CSURF-TWO: CSIDH for the Ratio (2 : 1). 148-156 - Xuejun Fan, Xiu Xu, Bao Li:
Group Key Exchange Protocols from Supersingular Isogenies. 157-173
System Security
- Yifu Geng, Bo Qin, Wenchang Shi, Qianhong Wu:
A Paid Message Forwarding Scheme Based on Social Network. 177-192 - Tieming Chen, Zhengqiu Weng, YunPeng Chen, Chenqiang Jin, Mingqi Lv, Tiantian Zhu, Jianhong Lin:
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation. 193-201 - Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen:
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors. 202-220 - Fan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang, Wuqiong Pan, Qiongxiao Wang:
E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS. 221-243
Privacy Protection
- Hailong Wang, Yi Deng, Xiang Xie:
Public Verifiable Private Decision Tree Prediction. 247-256 - Tianlin Song, Wei Wang, Fan Lang, Wenyi Ouyang, Qiongxiao Wang, Jingqiang Lin:
P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX. 257-276 - Yang Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma:
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach. 277-287 - Cailing Cai, Tsz Hon Yuen, Handong Cui, Mingli Wu, Siu-Ming Yiu:
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. 288-303
Secure Sequence
- Congwei Zhou, Jie Guan, Bin Hu, Kuan He:
On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences. 307-317 - Vladimir Edemskiy, Chenhuang Wu:
Symmetric 2-Adic Complexity of Ding-Helleseth Generalized Cyclotomic Sequences of Period pq. 318-327 - Xinying Wu, Yuan Ma, Tianyu Chen, Na Lv:
A Distinguisher for RNGs with LFSR Post-processing. 328-343 - Ming Li, Yupeng Jiang, Dongdai Lin:
On the k-Error Linear Complexities of De Bruijn Sequences. 344-356
Digital Signature
- Yiru Sun, Yanyan Liu:
A Lattice-Based Fully Dynamic Group Signature Scheme Without NIZK. 359-367 - Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. 368-384 - Yukun Wang, Mingqiang Wang:
A New Efficient Quantum Digital Signature Scheme for Multi-bit Messages. 385-394
Mathematical Fundamental
- Yi Liu, Qi Wang, Siu-Ming Yiu:
An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster. 397-414 - Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao:
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications. 415-432 - Jianghua Zhong, Yingyin Pan, Dongdai Lin:
On Galois NFSRs Equivalent to Fibonacci Ones. 433-449
Symmetric Cipher
- Lin Tan, Xuanyong Zhu, Wenfeng Qi:
Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles. 453-465 - Wenqi Yu, Yuqing Zhao, Chun Guo:
Provable Related-Key Security of Contracting Feistel Networks. 466-490 - Gang Liu, Peng Wang, Rong Wei, Dingfeng Ye:
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. 491-503
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.