default search action
19th Inscrypt 2023: Hangzhou, China - Part II
- Chunpeng Ge, Moti Yung:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14527, Springer 2024, ISBN 978-981-97-0944-1
System Security
- Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, Shouling Ji:
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models. 3-23 - Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Laiwei Jiang, Xiang Cheng:
An Android Malware Detection Method Using Better API Contextual Information. 24-36 - Changzhi Zhao, Kezhen Huang, Di Wu, Xueying Han, Dan Du, Yutian Zhou, Zhigang Lu, Yuling Liu:
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method. 37-52 - Dong Chen, Zhiyuan Qiu, Guangwu Xu:
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations. 53-72 - Zhou Tan, Ximeng Liu, Yan Che, Yuyang Wang:
Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing. 73-90 - Tingchao Fu, Fanxiao Li, Jinhong Zhang, Liang Zhu, Yuanyu Wang, Wei Zhou:
TIA: Token Importance Transferable Attack on Vision Transformers. 91-107
Cryptography Engineering
- Hang Yang, Rongmao Chen, Qiong Wang, Zixuan Wu, Wei Peng:
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber. 111-129 - Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. 130-149
Cryptanalysis
- Yi Guo, Danping Shi, Lei Hu, Yin Lv:
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra. 153-171 - Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu:
Automatic Search of Linear Structure: Applications to Keccak and Ascon. 172-192 - Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi:
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128. 193-208 - Qingfeng Cheng, Chunzhi Zhao, Jinzheng Cao, Fushan Wei:
Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound. 209-229 - Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2. 230-250 - Zhen Yang, Jing Li, Fei Cui, Jia Qi Liu, Yu Cheng, Xi Nan Tang, Shuai Gui:
Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis. 251-271 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Non-malleable Codes from Leakage Resilient Cryptographic Primitives. 272-290
Short Papers
- Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. 293-304 - Xin Sun, Anran Cui, Hui Chen, Xingchi Su:
A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles. 305-316 - Qingfeng Cheng, Jinzheng Cao, Xiangyang Luo:
Quantum Augmented Lattice Attack on NTRU with Side Information. 317-328 - Bo Yu, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun:
Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm. 329-342 - Yu Song, Yu Long, Xian Xu, Dawu Gu:
FaBFT: Flexible Asynchronous BFT Protocol Using DAG. 343-355 - Husheng Yang, Sha Ma, Pan Zhou, Guiquan Yang, Qiong Huang:
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search. 356-367 - Peiyi Tu, Xingjun Wang:
Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments. 368-386
Poster
- Changsong Jiang, Chunxiang Xu, Kefei Chen:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things. 389-393 - Renhua Xie, Xuxin Fang, Bo Ma, Chuanhuang Li, Xiaoyong Yuan:
TRGE: A Backdoor Detection After Quantization. 394-398 - Benqiang Wei, Xianhui Lu:
Improved Homomorphic Evaluation for Hash Function Based on TFHE. 399-402 - Ziyi Li, Xianhui Lu, Yao Cheng, Bao Li:
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM. 403-406 - Mengce Zheng:
Partial Key Exposure Attack on Common Prime RSA. 407-410 - Linghui Chen, Zhiguo Wan, Jun Zhou, Carvajal Roca Ivan Edmar:
An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth. 411-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.