


default search action
14th Inscrypt 2018: Fuzhou, China
- Fuchun Guo, Xinyi Huang, Moti Yung:

Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11449, Springer 2019, ISBN 978-3-030-14233-9
Invited Paper
- Zhaohui Cheng:

Security Analysis of SM9 Key Agreement and Encryption. 3-25
Blockchain and Crypto Currency
- Runchao Han, Jiangshan Yu

, Joseph K. Liu, Peng Zhang:
Evaluating CryptoNote-Style Blockchains. 29-48 - Cencen Wan, Shuyang Tang, Yuncong Zhang

, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. 49-69 - Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang

:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. 70-85 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen

:
Anonymity Reduction Attacks to Monero. 86-100 - Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng

, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. 101-114
Lattice-Based Cryptology
- Shuai Zhou

, Haiyang Xue
, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. 117-137 - Zengpeng Li, Ding Wang

:
Two-Round PAKE Protocol over Lattices Without NIZK. 138-159
Symmetric Cryptology
- Shi Wang, Zejun Xiang

, Xiangyong Zeng, Shasha Zhang:
Improved Integral Attacks on PRESENT-80. 163-182 - Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang:

Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128. 183-199 - Kamel Ammour, Lei Wang:

Improved Indifferentiability Security Bound for the Prefix-Free Merkle-Damgård Hash Function. 200-219
Applied Cryptography
- Dengzhi Liu, Jian Shen

, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. 223-239 - Mingwu Zhang, Yan Jiang

, Hua Shen, Bingbing Li, Willy Susilo
:
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation. 240-259 - Zhimei Sui, Shangqi Lai

, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. 260-273 - Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam

, Xun Yi:
Using Blockchain to Control Access to Cloud Data. 274-288 - Randolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun:

A Multi-client DSSE Scheme Supporting Range Queries. 289-307 - Haixia Chen, Shangpeng Wang, Hongyan Zhang, Wei Wu:

Image Authentication for Permissible Cropping. 308-325
Information Security
- Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song:

Chord: Thwarting Relay Attacks Among Near Field Communications. 329-348 - Mark Huasong Meng, Guangdong Bai

, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. 349-369 - Xudong Zhu, Hui Li, Yang Yu:

Blockchain-Based Privacy Preserving Deep Learning. 370-383 - Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia

, Chunhua Su, Dandan Xu:
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. 384-403 - Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang:

A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. 404-423
Asymmetric Encryption
- Chuangui Ma, Aijun Ge

, Jie Zhang:
Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model. 427-447 - Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang

:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. 448-467 - Mriganka Mandal

, Ratna Dutta:
Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework. 468-489 - Jingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh:

Attribute-Based Encryption with Efficient Keyword Search and User Revocation. 490-509 - Dali Zhu, Renjun Zhang, Shuang Hu, Gongliang Chen:

Public-Key Encryption with Selective Opening Security from General Assumptions. 510-530
Foundations
- Eloi de Chérisey, Sylvain Guilley, Olivier Rioul:

Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR. 533-553 - Guiwen Luo, Xiao Chen:

Searching BN Curves for SM9. 554-567 - Qun-Xiong Zheng, Dongdai Lin, Wen-Feng Qi:

Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers. 568-585 - Jingyue Yu:

Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness Encryption. 586-606 - Shuai Li, Bin Hu:

Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHE. 607-617
Short Papers
- Dingyi Pei, Jingang Liu:

A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme. 621-625 - Jinhui Liu, Yong Yu

, Yannan Li
, Yanqi Zhao, Xiaojiang Du:
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing. 626-636 - Yuan Wang, Liming Wang, Zhen Xu, Wei An:

Understanding User Behavior in Online Banking System. 637-646 - Yangguang Tian, Yingjiu Li, Binanda Sengupta

, Robert Huijie Deng
, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. 647-657 - Masatsugu Oya, Kazumasa Omote:

Early Detection of Remote Access Trojan by Software Network Behavior. 658-671

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














