


default search action
Inscrypt 2013: Guangzhou, China
- Dongdai Lin, Shouhuai Xu, Moti Yung:

Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8567, Springer 2014, ISBN 978-3-319-12086-7
Boolean Function and Block Cipher
- Chunming Tang, Yu Lou, Yanfeng Qi, Maozhi Xu, Baoan Guo:

A Note on Semi-bent and Hyper-bent Boolean Functions. 3-21 - Claude Carlet, Deng Tang

, Xiaohu Tang, Qunying Liao:
New Construction of Differentially 4-Uniform Bijections. 22-38 - Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:

Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. 39-51
Sequence and Stream Cipher
- Yunqing Xu:

On the Key-Stream Periods Probability of Edon80. 55-69 - Jianqin Zhou, Wanquan Liu

, Guanglu Zhou:
Cube Theory and Stable k -Error Linear Complexity for Periodic Sequences. 70-85 - Xinxin Gong, Bin Zhang, Dengguo Feng, Tongjiang Yan:

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. 86-98
Applications: Systems and Theory
- Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang:

Automatic Detection and Analysis of Encrypted Messages in Malware. 101-117 - Hongliang Liang, Yu Dong, Bin Wang, Shuchang Liu:

EAdroid: Providing Environment Adaptive Security for Android System. 118-131 - Przemyslaw Kubiak

, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. 132-149 - Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding

, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. 150-164
Computational Number Theory
- Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang:

Omega Pairing on Hyperelliptic Curves. 167-184 - Liangze Li, Hongfeng Wu

, Fan Zhang:
Pairing Computation on Edwards Curves with High-Degree Twists. 185-200 - Zhi Hu, Maozhi Xu:

The Gallant-Lambert-Vanstone Decomposition Revisited. 201-216 - Zhe Liu, Johann Großschädl, Duncan S. Wong:

Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. 217-235
Public Key Cryptography
- Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer

, Bo Qin, Sherman S. M. Chow
, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. 239-254 - Shengli Liu, Kouichi Sakurai, Jian Weng

, Fangguo Zhang
, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. 255-269 - Dingding Jia, Bao Li, Xianhui Lu, Yamin Liu:

RSA-OAEP is RKA Secure. 270-281 - Zhengjun Cao, Frédéric Lafitte, Olivier Markowitch:

A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme. 282-288
Hash Function
- Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:

LHash: A Lightweight Hash Function. 291-308 - Jian Zou, Wenling Wu, Shuang Wu:

Cryptanalysis of the Round-Reduced GOST Hash Function. 309-322
Side-Channel and Leakage
- Suvadeep Hajra, Debdeep Mukhopadhyay:

Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. 325-342 - Mingjie Liu, Jiazhe Chen

, Hexin Li:
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. 343-358
Application and System Security
- Kai Chen, Dongdai Lin, Li Yan, Xin Sun:

Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions. 361-376 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:

One-Time Programs with Limited Memory. 377-394 - Xiaoqian Li, Peng Wang, Bao Li, Zhelei Sun:

Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. 395-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














