


default search action
Inscrypt 2010: Shanghai, China
- Xuejia Lai, Moti Yung, Dongdai Lin:

Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6584, Springer 2011, ISBN 978-3-642-21517-9
Encryption Schemes
- Lihua Wang

, Licheng Wang, Zhenfu Cao
, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. 1-17 - Helger Lipmaa

:
On the CCA1-Security of Elgamal and Damgård's Elgamal. 18-35 - Joseph K. Liu

, Joonsang Baek
, Jianying Zhou
:
Online/Offline Identity-Based Signcryption Revisited. 36-51 - Huafei Zhu, Feng Bao:

Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. 52-61
Stream Ciphers, Sequences and Elliptic Curves
- Jiageng Chen

, Atsuko Miyaji
:
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. 62-76 - Sourav Das, Dipanwita Roy Chowdhury:

An Efficient, Parameterized and Scalable S-box for Stream Ciphers. 77-94 - Zhixiong Chen, Xiangguo Cheng, Chenhuang Wu:

A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse. 95-104 - Zhi Hu, Maozhi Xu, Zhenghua Zhou:

A Generalization of Verheul's Theorem for Some Ordinary Curves. 105-114
Secure Computing
- Zhanfei Zhou:

On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes. 115-124 - Paolo Palmieri

, Olivier Pereira:
Building Oblivious Transfer on Channel Delays. 125-138
Hash Functions
- Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen:

Variants of Multicollision Attacks on Iterated Hash Functions. 139-154 - Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:

Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. 155-168 - Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama:

Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. 169-186 - Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:

Pseudo-Cryptanalysis of Luffa. 187-198 - Gaoli Wang:

Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}. 199-217
Key Management
- Weijia Wang, Lei Hu, Yong Li:

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. 218-235 - Yvo Desmedt, Atsuko Miyaji

:
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. 236-254 - Ying Liu, Fushan Wei, Chuangui Ma:

Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting. 255-267 - Zheng Gong, Qiang Tang, Yee Wei Law

, Hongyang Chen
:
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. 268-283 - Qi Chen, Dingyi Pei, Jun-Wu Dong:

Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. 284-299
Digital Signatures
- Junqing Gong, Haifeng Qian, Yuan Zhou:

Fully-Secure and Practical Sanitizable Signatures. 300-317 - Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta:

Rigorous Security Requirements for Designated Verifier Signatures. 318-335 - Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr:

Quasi-Dyadic CFS Signatures. 336-349 - Yilian Zhang, Zhide Chen, Fuchun Guo

:
Online/Offline Verification of Short Signatures. 350-358
Privacy and Algebraic Cryptanalysis
- Rui Zhang:

Acquiring Key Privacy from Data Privacy. 359-372 - Lukasz Krzywiecki

, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. 373-386 - Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret:

Algebraic Precomputations in Differential and Integral Cryptanalysis. 387-403 - Qichun Wang, Thomas Johansson

:
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. 404-414
Hashing and Authentication
- Xiaofeng Chen, Haibo Tian, Fangguo Zhang

, Yong Ding:
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. 415-426 - Pedro Peris-Lopez

, Julio César Hernández Castro
, Raphael C.-W. Phan
, Juan M. Estévez-Tapiador
, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. 427-442 - Shaoquan Jiang:

Dwork-Naor ZAP and Its Application in Deniable Authentication, Revisited. 443-454
Hardware and Software Issues
- Fuchun Guo

, Yi Mu, Willy Susilo
:
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. 455-470 - Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette:

Characterization of the Electromagnetic Side Channel in Frequency Domain. 471-486 - Ning Ding, Dawu Gu:

On Obfuscating Programs with Tamper-proof Hardware. 487-502 - Yi Yang, Lingyun Ying, Rui Wang

, Purui Su, Dengguo Feng:
DepSim: A Dependency-Based Malware Similarity Comparison System. 503-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














