


default search action
Inscrypt 2012: Beijing, China
- Miroslaw Kutylowski, Moti Yung:

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6 - Lidong Han, Wei Wei, Mingjie Liu:

On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown. 1-9 - Subidh Ali

, Debdeep Mukhopadhyay:
Differential Fault Analysis of Twofish. 10-28 - Phuong Ha Nguyen, Chester Rebeiro

, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. 29-45 - Yang Li, Kazuo Ohta, Kazuo Sakiyama:

An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. 46-59 - Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou:

A Robust Fuzzy Extractor without ECCs. 60-68 - Yang Yu, Zhanfei Zhou:

An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels. 69-89 - Teng Guo, Feng Liu, Chuan Kun Wu:

Visual Cryptography for Natural Images and Visual Voting. 90-101 - Yuan Chen, Qingkuan Dong:

RCCA Security for KEM+DEM Style Hybrid Encryptions. 102-121 - Jintai Ding

, Ai Ren, Chengdong Tao:
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. 122-136 - Moesfa Soeheila Mohamad, Geong Sen Poh:

Verifiable Structured Encryption. 137-156 - Shlomi Dolev, Nova Fandina, Ximing Li

:
Nested Merkle's Puzzles against Sampling Attacks. 157-174 - Michael Walter

, Stanislav Bulygin, Johannes Buchmann:
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC. 175-197 - Harry Bartlett

, Mufeed Juma AlMashrafi, Leonie Simpson
, Ed Dawson
, Kenneth Koon-Ho Wong
:
A General Model for MAC Generation Using Direct Injection. 198-215 - Zhelei Sun, Peng Wang, Liting Zhang:

Collision Attacks on Variant of OCB Mode and Its Series. 216-224 - Kazumaro Aoki, Kan Yasuda:

The Security and Performance of "GCM" when Short Multiplications Are Used Instead. 225-245 - Risto M. Hakala, Atle Kivelä, Kaisa Nyberg:

Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN. 246-262 - Tao Shi, Vladimir Anashin

, Dongdai Lin:
Fast Evaluation of T-Functions via Time-Memory Trade-Offs. 263-275 - Tianze Wang, Meicheng Liu, Dongdai Lin:

Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. 276-293 - Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li:

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. 294-310 - Lin Wang, Zhi Hu:

New Sequences of Period p n and p n + 1 via Projective Linear Groups. 311-330 - Yuxin Meng

, Duncan S. Wong, Roman Schlegel, Lam-for Kwok
:
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. 331-350 - Mehdi Khalfaoui, Refik Molva

, Laurent Gomez:
Secure Product Tracking in Supply Chain. 351-370 - Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa

, Iosif Spulber, Serge Vaudenay:
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. 371-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














