


default search action
Inscrypt 2011: Beijing, China
- Chuankun Wu, Moti Yung, Dongdai Lin:

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7537, Springer 2012, ISBN 978-3-642-34703-0 - Benoît Libert, Moti Yung:

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems. 1-21 - Phong Q. Nguyen:

Cryptanalysis vs. Provable Security. 22-23 - Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas

:
Boosting Scalability in Anomaly-Based Packed Executable Filtering. 24-43 - Lin Wang, Bing Shen, TongXu Qiao:

Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs. 44-56 - Nicky Mouha, Qingju Wang

, Dawu Gu, Bart Preneel:
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. 57-76 - Zhengjun Cao, Qian Sha, Xiao Fan:

Adleman-Manders-Miller Root Extraction Method Revisited. 77-85 - Teng Guo, Feng Liu, Chuan Kun Wu:

Multi-pixel Encryption Visual Cryptography. 86-92 - Yi-Ning Liu

, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao
:
An Improved Electronic Voting Scheme without a Trusted Random Number Generator. 93-101 - Jiang Weng, Yunqi Dou, Chuangui Ma, Nadia El Mrabet:

Fault Attacks against the Miller Algorithm in Hessian Coordinates. 102-112 - Wei Huang, Xianfeng Zhao

, Dengguo Feng, Rennong Sheng:
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. 113-130 - Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:

Improved Tradeoff between Encapsulation and Decapsulation of HK09. 131-141 - Haibo Tian, Xiaofeng Chen, Zhengtao Jiang:

Non-interactive Deniable Authentication Protocols. 142-159 - Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng:

On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3. 160-178 - Nan Li

, Yi Mu, Willy Susilo
:
Efficient Self-certified Signatures with Batch Verification. 179-194 - Jiang Zhang

, Xiang Xie
, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. 195-209 - Xusheng Zhang, Shan Chen, Dongdai Lin:

Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves. 210-226 - Yibin Dai, Shao-zhen Chen:

Weak-Key Class of MISTY1 for Related-Key Differential Attack. 227-236 - Xiaoli Yu, Wenling Wu, Yanjun Li

, Lei Zhang:
Cryptanalysis of Reduced-Round KLEIN Block Cipher. 237-250 - Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu

:
An Efficient RSA Implementation without Precomputation. 251-268 - Gautham Sekar:

The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. 269-288 - Naoto Kiribuchi

, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura:
Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. 289-308 - Jian Zhou, Ji Xiang, Neng Gao:

Towards Attack Resilient Social Network Based Threshold Signing. 309-323 - Jiang Zhang

, Zhenfeng Zhang:
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. 324-340 - Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:

Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. 341-362 - Guifang Huang, Lei Hu:

Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function. 363-378 - Chenggen Song, Maozhi Xu, Chunming Tang:

Pseudorandom Generators Based on Subcovers for Finite Groups. 379-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














