


default search action
Inscrypt 2017: Beijing, China
- Xiaofeng Chen, Dongdai Lin, Moti Yung:

Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7
Keynote Speeches
- Elisa Bertino:

Security and Privacy in the IoT. 3-10 - Miroslaw Kutylowski:

On Crossroads of Privacy Protection. 11-20 - Kui Ren:

The Dual Role of Smartphones in IoT Security. 21-24
Cryptographic Protocols and Algorithms
- Zheng Zhang, Fangguo Zhang

, Huang Zhang
:
Implementing Indistinguishability Obfuscation Using GGH15. 27-43 - Jingyue Yu

, Yi Deng, Yu Chen
:
From Attack on Feige-Shamir to Construction of Oblivious Transfer. 44-64 - Ping Wang

, DongDong Shang:
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing. 65-80 - Haibo Tian, Liqing Fu, Jiejie He:

A Simpler Bitcoin Voting Protocol. 81-98 - Xinwei Gao, Jintai Ding

, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. 99-116 - Xiaoyang He, Wei Yu, Kunpeng Wang:

Hashing into Twisted Jacobi Intersection Curves. 117-138
Digital Signatures
- Nobuaki Kitajima, Naoto Yanai

, Takashi Nishide:
Identity-Based Key-Insulated Aggregate Signatures, Revisited. 141-156 - Sudhakar Kumawat

, Souradyuti Paul:
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles. 157-179 - Fei Zhu

, Yuexin Zhang, Chao Lin
, Wei Wu, Ru Meng:
A Universal Designated Multi-Verifier Transitive Signature Scheme. 180-195 - Xiaodong Yang

, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. 196-208
Encryption
- Xuguang Wu

, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. 211-222 - Geng Wang, Xiao Zhang, Yanmei Li:

Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). 223-241 - Liquan Chen, Ming Kim Lim

, Muyang Wang:
Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing. 242-259 - Biao Wang, Xueqing Wang, Rui Xue:

Leveled FHE with Matrix Message Space. 260-277 - Hanwen Feng

, Jianwei Liu
, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. 278-298
Cryptanalysis and Attack
- Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. 301-320 - Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou:

A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs. 321-341 - Xiaojuan Zhang, Dongdai Lin:

Cryptanalysis of Acorn in Nonce-Reuse Setting. 342-361 - Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang:

An Improved Method to Unveil Malware's Hidden Behavior. 362-382 - Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. 383-403 - Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, Fushan Wei:

Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling. 404-426 - Yuanhao Deng, Chenhui Jin, Rongjia Li:

Meet in the Middle Attack on Type-1 Feistel Construction. 427-444
Applications
- Chujiao Ma, John A. Chandy

, Laurent Michel
, Fanghui Liu, Waldemar Cruz:
Influence of Error on Hamming Weights for ASCA. 447-460 - Xiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song:

State-of-the-Art: Security Competition in Talent Education. 461-481 - Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, Siyun Yan:

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. 482-499 - Chonghua Wang, Zhiyu Hao, Xiaochun Yun:

NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment. 500-517 - Shanding Xu, Xiwang Cao, Chunming Tang:

A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes. 518-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














