


default search action
Inscrypt 2008: Beijing, China
- Moti Yung, Peng Liu, Dongdai Lin:

Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5487, Springer 2009, ISBN 978-3-642-01439-0
Invited Talks
- Bart Preneel

:
The State of Hash Functions and the NIST SHA-3 Competition. 1-11 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:

Key Evolution Systems in Untrusted Update Environments. 12-21 - Peng Liu:

Secure and Privacy-Preserving Information Brokering. 22
Digital Signature and Signcryption Schemes
- Wei Zhao, Changlu Lin, Dingfeng Ye:

Provably Secure Convertible Nominative Signature Scheme. 23-40 - Huaqun Wang, Hong Yu:

Cryptanalysis of Two Ring Signcryption Schemes. 41-46 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:

Efficient Signcryption Key Encapsulation without Random Oracles. 47-59
Privacy and Anonymity
- Rui Zhang, Hideki Imai:

Strong Anonymous Signatures. 60-71 - Bo Qin, Qianhong Wu, Willy Susilo

, Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption. 72-83 - Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo

:
Privacy for Private Key in Signatures. 84-95
Message Authentication Code and Hash Function
- Peng Wang

, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. 96-114 - Luk Bettale, Jean-Charles Faugère, Ludovic Perret:

Security Analysis of Multivariate Polynomials for Hashing. 115-124
Secure Protocols
- Mengjun Li, Ti Zhou, Zhoujun Li:

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. 125-140 - Kun Peng, Feng Bao:

Batch ZK Proof and Verification of OR Logic. 141-156
Symmetric Cryptography
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. 157-180 - Wenying Zhang, Jing Han:

Impossible Differential Analysis of Reduced Round CLEFIA. 181-191 - Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan:

Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. 192-200
Certificateless Cryptography
- Piyi Yang, Zhenfu Cao

, Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. 201-216 - Xu An Wang

, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. 217-239
Hardware Implementation and Side Channel Attack
- Mooseop Kim

, Jaecheol Ryou
, Sungik Jun:
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. 240-252 - Duo Liu, Zhiyong Tan, Yiqi Dai:

New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. 253-264
Wireless Network Security
- Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:

A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. 265-274 - Sushmita Ruj

, Bimal K. Roy:
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. 275-288 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:

Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. 289-304
Public Key and Identity Based Cryptography
- Ningbo Mu, Yupu Hu, Leyou Zhang:

On the Computational Efficiency of XTR+. 305-313 - Mahabir Prasad Jhanwar

, Rana Barua:
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. 314-331 - Qiang Tang, Pieter H. Hartel

, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. 332-347
Access Control and Network Security
- Zonghua Zhang

, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. 348-369 - Lingli Deng, Yeping He, Ziyao Xu:

Separation of Duty in Trust-Based Collaboration. 370-388
Trusted Computing and Applications
- Ziyao Xu, Yeping He, Lingli Deng:

An Integrity Assurance Mechanism for Run-Time Programs. 389-405 - Tong-Lee Lim, Tieyan Li, Yingjiu Li:

A Security and Performance Evaluation of Hash-Based RFID Protocols. 406-424 - Kun Peng, Feng Bao:

Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. 425-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














