![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
25th ACISP 2020: Perth, WA, Australia
- Joseph K. Liu
, Hui Cui:
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings. Lecture Notes in Computer Science 12248, Springer 2020, ISBN 978-3-030-55303-6
Post-quantum Cryptography
- Huy Quoc Le
, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh
, Josef Pieprzyk
, Thomas Plantard
:
Lattice Blind Signatures with Forward Security. 3-22 - Yan Huang, Fangguo Zhang
, Zhi Hu, Zhijie Liu:
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves. 23-40 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts. 41-61 - Boru Gong, Leixiao Cheng, Yunlei Zhao:
SKCN: Practical and Flexible Digital Signature from Module Lattice. 62-81 - Gareth T. Davies
, Herman Galteland, Kristian Gjøsteen, Yao Jiang
:
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security. 82-101
Symmetric Cipher
- Jinyu Lu, Yunwen Liu, Tomer Ashur
, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. 105-124 - Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
A New Improved AES S-box with Enhanced Properties. 125-141 - Yuji Koike, Kosei Sakamoto, Takuya Hayashi
, Takanori Isobe:
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers. 142-159 - Wei-Zhu Yeoh
, Je Sen Teh, Jiageng Chen:
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm. 160-179
Signature
- Sanjit Chatterjee, R. Kabaleeshwaran:
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption. 183-203 - Junhao Huang
, Zhe Liu, Zhi Hu, Johann Großschädl:
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2. 204-224 - Masayuki Tezuka, Keisuke Tanaka:
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme. 225-243
Network Security and Blockchain
- Zuchao Ma, Liang Liu, Weizhi Meng
:
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks. 247-267 - Xiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu:
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. 268-284 - Tongchen Wang, Jianwei Liu
, Dawei Li, Qianhong Wu:
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models. 285-305
Cryptographic Primitives
- Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng:
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition. 309-329 - Rafael Kurek:
Efficient Forward-Secure Threshold Public Key Encryption. 330-349 - Zhijie Xie, Min Zhang, Anqi Yin, Zhenhan Li:
A New Targeted Password Guessing Model. 350-368 - Bo Pang, Long Chen, Xiong Fan, Qiang Tang:
Multi-input Laconic Function Evaluation. 369-388
Mathematical Foundation
- Yusong Du, Baoying Fan, Baodian Wei:
Arbitrary-Centered Discrete Gaussian Sampling over the Integers. 391-407 - Xiaopeng Zhao, Zhenfu Cao
, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. 408-424 - Chao Sun
, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. 425-444
Machine Learning Security
- Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
PALOR: Poisoning Attacks Against Logistic Regression. 447-460 - Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. 461-475
Attack
- Linyu Li, Lei Yu, Can Yang, Jie Gou, Jiawei Yin, Xiaorui Gong:
Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices. 479-504 - Satoshi Okada, Yuntao Wang
, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. 505-524 - Anubhab Baksi, Vinay B. Y. Kumar
, Banashri Karmakar
, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. 525-542 - Hanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim:
Design and Evaluation of Enumeration Attacks on Package Tracking Systems. 543-559
Privacy
- Mengfei Xie, Jianming Fu, Jia He, Chenke Luo
, Guojun Peng:
JTaint: Finding Privacy-Leakage in Chrome Extensions. 563-583 - Aditya Damodaran
, Alfredo Rial
:
Unlinkable Updatable Databases and Oblivious Transfer with Access Control. 584-604 - Yaoan Jin, Atsuko Miyaji
:
Secure and Compact Elliptic Curve LR Scalar Multiplication. 605-618
Short Papers
- Xiaoyu Guo
, Yan Liu, Lian Liu, Guangsheng Zhang, Jing Chen, Yuan Zhao:
User Identity Linkage Across Social Networks via Community Preserving Network Embedding. 621-630 - Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. 631-641 - Kento Oonishi
, Noboru Kunihiro:
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. 642-652 - Bozhi Wang, Qin Wang
, Shiping Chen
, Yang Xiang:
Security Analysis on Tangle-Based Blockchain Through Simulation. 653-663 - Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. 664-673
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.