default search action
Inscrypt 2013: Guangzhou, China
- Dongdai Lin, Shouhuai Xu, Moti Yung:
Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8567, Springer 2014, ISBN 978-3-319-12086-7
Boolean Function and Block Cipher
- Chunming Tang, Yu Lou, Yanfeng Qi, Maozhi Xu, Baoan Guo:
A Note on Semi-bent and Hyper-bent Boolean Functions. 3-21 - Claude Carlet, Deng Tang, Xiaohu Tang, Qunying Liao:
New Construction of Differentially 4-Uniform Bijections. 22-38 - Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. 39-51
Sequence and Stream Cipher
- Yunqing Xu:
On the Key-Stream Periods Probability of Edon80. 55-69 - Jianqin Zhou, Wanquan Liu, Guanglu Zhou:
Cube Theory and Stable k -Error Linear Complexity for Periodic Sequences. 70-85 - Xinxin Gong, Bin Zhang, Dengguo Feng, Tongjiang Yan:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. 86-98
Applications: Systems and Theory
- Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang:
Automatic Detection and Analysis of Encrypted Messages in Malware. 101-117 - Hongliang Liang, Yu Dong, Bin Wang, Shuchang Liu:
EAdroid: Providing Environment Adaptive Security for Android System. 118-131 - Przemyslaw Kubiak, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. 132-149 - Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. 150-164
Computational Number Theory
- Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang:
Omega Pairing on Hyperelliptic Curves. 167-184 - Liangze Li, Hongfeng Wu, Fan Zhang:
Pairing Computation on Edwards Curves with High-Degree Twists. 185-200 - Zhi Hu, Maozhi Xu:
The Gallant-Lambert-Vanstone Decomposition Revisited. 201-216 - Zhe Liu, Johann Großschädl, Duncan S. Wong:
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. 217-235
Public Key Cryptography
- Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. 239-254 - Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. 255-269 - Dingding Jia, Bao Li, Xianhui Lu, Yamin Liu:
RSA-OAEP is RKA Secure. 270-281 - Zhengjun Cao, Frédéric Lafitte, Olivier Markowitch:
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme. 282-288
Hash Function
- Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function. 291-308 - Jian Zou, Wenling Wu, Shuang Wu:
Cryptanalysis of the Round-Reduced GOST Hash Function. 309-322
Side-Channel and Leakage
- Suvadeep Hajra, Debdeep Mukhopadhyay:
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. 325-342 - Mingjie Liu, Jiazhe Chen, Hexin Li:
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. 343-358
Application and System Security
- Kai Chen, Dongdai Lin, Li Yan, Xin Sun:
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions. 361-376 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:
One-Time Programs with Limited Memory. 377-394 - Xiaoqian Li, Peng Wang, Bao Li, Zhelei Sun:
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. 395-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.