


default search action
Inscrypt 2016: Beijing, China
- Kefei Chen, Dongdai Lin, Moti Yung:

Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10143, Springer 2017, ISBN 978-3-319-54704-6
Symmetric Ciphers
- Yafei Zheng, Wenling Wu:

Biclique Attack of Block Cipher SKINNY. 3-17 - Shaomei Wang, Tingting Cui, Meiqin Wang:

Improved Differential Cryptanalysis of CAST-128 and CAST-256. 18-32 - Wentan Yi, Baofeng Wu

, Shaozhen Chen, Dongdai Lin:
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher. 33-46 - Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:

Impossible Differentials of SPN Ciphers. 47-63 - Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya

:
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. 64-83 - Jialin Huang, Hailun Yan, Xuejia Lai:

Transposition of AES Key Schedule. 84-102 - Goutam Paul, Abhiroop Sanyal:

Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. 103-116
Public-Key Cryptosystems
- Shiwei Zhang, Yi Mu, Guomin Yang

:
Achieving IND-CCA Security for Functional Encryption for Inner Products. 119-139 - Liqiang Peng, Lei Hu, Yao Lu, Hongyun Wei:

An Improved Analysis on Three Variants of the RSA Cryptosystem. 140-149 - Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:

How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. 150-165
Signature and Authentication
- Aysajan Abidin

:
On Privacy-Preserving Biometric Authentication. 169-186 - Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu:

A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. 187-204 - Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:

Identity-Based Blind Signature from Lattices in Standard Model. 205-218
Homomorphic Encryption
- Zengpeng Li

, Chunguang Ma, Eduardo Morais, Gang Du:
Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based. 221-242 - Jingguo Bi, Jiayang Liu, Xiaoyun Wang:

Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. 243-252 - Seiko Arita, Shota Nakasato:

Fully Homomorphic Encryption for Point Numbers. 253-270
Leakage-Resilient
- Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz

:
Bounded-Retrieval Model with Keys Derived from Private Data. 273-290 - Wenpan Jing, Xianhui Lu, Bao Li:

Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. 291-308 - Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:

Codes for Detection of Limited View Algebraic Tampering. 309-320
Post-quantum Cryptography
- Brian Koziel, Reza Azarderakhsh, David Jao

, Mehran Mozaffari Kermani
:
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography. 323-342 - Jinhui Liu, Huanguo Zhang, Jianwei Jia:

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. 343-354
Commitment and Protocol
- Xiaona Zhang, Li-Ping Wang:

Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial. 357-366 - Deepak Kumar Dalai

, Pinaki Sarkar:
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks. 367-385 - Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang:

One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. 386-400
Elliptic Curves
- Meng Zhang, Zhi Hu, Maozhi Xu:

On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1. 403-415 - Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He:

Constructing Isogenies on Extended Jacobi Quartic Curves. 416-427
Security and Implementation
- Cong Chen, Dongdai Lin:

Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework. 431-450 - Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Jialu Hao, Ming Xian:

Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment. 451-471 - Yu Wang, Yun Cao, Xianfeng Zhao

:
Video Steganalysis Based on Centralized Error Detection in Spatial Domain. 472-483 - Hafizah Mansor

, Konstantinos Markantonakis
, Raja Naeem Akram
, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. 484-504 - Sumit Kumar Debnath

, Ratna Dutta:
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter. 505-525 - Maciej Skorski:

Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure. 526-541

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














