default search action
17th Inscrypt 2021: Virtual Event
- Yu Yu, Moti Yung:
Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13007, Springer 2021, ISBN 978-3-030-88322-5
Signatures
- George Teseleanu:
Concurrent Signatures from a Variety of Keys. 3-22 - Jie Song, Yunhua Wen:
A Generic Construction of Fuzzy Signature. 23-41 - Mohamed Nassurdine, Huang Zhang, Fangguo Zhang:
Identity Based Linkable Ring Signature with Logarithmic Size. 42-60 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
Security Analysis of DGM and GM Group Signature Schemes Instantiated with XMSS-T. 61-81
System Security
- Geng Li, Jianwei Liu, Zongyang Zhang, Yanting Zhang:
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module. 85-110 - Loïs Huguenin-Dumittan, Iraklis Leontiadis:
A Message Franking Channel. 111-128 - Yunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li:
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation. 129-148
Symmetric Cryptanalysis
- Laila El Aimani:
A New Approach for Finding Low-Weight Polynomial Multiples. 151-170 - Shichang Wang, Shiqi Hou, Meicheng Liu, Dongdai Lin:
Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT. 171-190 - Mingxing Wang, Yonglin Hao:
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1. 191-211 - Chunlei Hong, Shasha Zhang, Siwei Chen, Da Lin, Zejun Xiang:
More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers. 212-232
Asymmetric Cryptanalysis
- Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:
Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. 235-250 - Shuaigang Li, Shuqin Fan, Xianhui Lu:
Attacking ECDSA Leaking Discrete Bits with a More Efficient Lattice. 251-266
Cryptographic Protocols
- Hongrui Cui, Kaiyi Zhang:
A Simple Post-Quantum Non-interactive Zero-Knowledge Proof from Garbled Circuits. 269-280 - Yi Liu, Qi Wang, Siu-Ming Yiu:
Improved Zero-Knowledge Argument of Encrypted Extended Permutation. 281-298
Mathematical Foundations
- Wenhui Kong, Jianghua Zhong, Dongdai Lin:
Isomorphism and Equivalence of Galois Nonlinear Feedback Shift Registers. 301-315 - Zhizhong Pan, Xiao Li:
Elliptic Curve and Integer Factorization. 316-330 - Yangpan Zhang, Maozhi Xu:
On the Linear Complexity of Feedforward Clock-Controlled Sequence. 331-348
Symmetric Cryptography
- Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
On Characterization of Transparency Order for (n, m)-functions. 351-370 - Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi:
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). 371-383 - Xueping Yan, Lin Tan, Hong Xu, Wenfeng Qi:
On the Provable Security Against Truncated Impossible Differential Cryptanalysis for AES in the Master-Key Setting. 384-398 - Yufeng Tang, Zheng Gong, Tao Sun, Jinhai Chen, Fan Zhang:
Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher Implementations. 399-417
Public Key Cryptography
- Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. 421-441 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices. 442-465 - Ruiqi Li, Chunfu Jia:
Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme. 466-484
Real World Cryptography
- Wenyuan Li, Wei Wang, Jingqiang Lin, Qiongxiao Wang, Wenjie Wang:
Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance. 487-506 - Liam Medley, Elizabeth A. Quaglia:
Collaborative Verifiable Delay Functions. 507-530 - Wenjie Wang, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, Qiongxiao Wang:
SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC. 531-550
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.