


default search action
15th Inscrypt 2019: Nanjing, China
- Zhe Liu, Moti Yung:

Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12020, Springer 2020, ISBN 978-3-030-42920-1
Invited Paper
- Xinyu Zhang

, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu
:
Revocable and Linkable Ring Signature. 3-27
Post-Quantum Cryptography
- Yingshan Yang, Xiaozhuo Gu, Bin Wang, Taizhong Xu:

Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus. 31-49 - Dung Hoang Duong, Willy Susilo

, Minh Kim Bui
, Thanh Xuan Khuc:
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model. 50-65 - Jie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li:

Attribute-Based Keyword Search from Lattices. 66-85 - Tomoki Moriya

, Katsuyuki Takashima, Tsuyoshi Takagi:
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. 86-98
AI Security
- Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen:

RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems. 101-117 - Weiqing Huang, Xiao Peng, Zhixin Shi:

A SeqGAN-Based Method for Mimicking Attack. 118-133 - Yuyue Zhao, Yangyang Li, Tengfei Yang, Haiyong Xie:

Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning. 134-153
Systems Security
- Yueyao Chen, Qianjun Liu, Tianyu Du, Yuan Chen, Shouling Ji:

Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy. 157-172 - Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji:

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. 173-198 - Qiang Tang:

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service. 199-207 - Hao Jiang, Weizhi Meng

, Chunhua Su, Kim-Kwang Raymond Choo:
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones. 208-224 - Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:

SymSem: Symbolic Execution with Time Stamps for Deobfuscation. 225-245 - Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang:

Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS. 246-259 - Senshan Pan, Zhuhua Li, Liangmin Wang:

Improving Division Property Based Cube Attacks by Removing Invalid Monomials. 260-276 - Houhua He, Lei Yu, Weixia Cai, Xiaoyu Wang, Xiaorui Gong, Haoyu Wang

, Chen Liu:
PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework. 277-290 - Xueyi Yang, Na Lv, Tianyu Chen, Cunqing Ma, Limin Liu:

A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System. 291-308 - Jun Zhao

, Jiangshan Yu
, Joseph K. Liu:
Consolidating Hash Power in Blockchain Shards with a Forest. 309-322
Side Channel Attacks
- Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:

Evaluating the Cache Side Channel Attacks Against ECDSA. 325-345 - Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama:

Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor. 346-361
Identity-Based Cryptography
- Mriganka Mandal

, Ratna Dutta:
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. 365-380 - Xuecheng Ma, Dongdai Lin:

Generic Constructions of Revocable Identity-Based Encryption. 381-396 - Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. 397-415
Signatures
- Mahender Kumar, Satish Chand:

A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services. 419-434 - Tingting Lu, Jiangtao Li

, Lei Zhang, Kwok-Yan Lam:
Group Signatures with Decentralized Tracing. 435-442 - Jiahui Chen

, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan
:
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature. 443-451 - Swati Rawal, Sahadeo Padhye

:
Untraceability of Partial Blind and Blind Signature Schemes. 452-459
Cryptanalysis
- Zhichao Xu, Hong Xu, Xuejia Lai:

Improved Integral Attack on Generalized Feistel Cipher. 463-479 - Xiaoxuan Lou, Fan Zhang, Guorui Xu, Ziyuan Liang, Xinjie Zhao, Shize Guo, Kui Ren:

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance. 480-496
Authentication
- Qihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei:

Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model. 499-516 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert

:
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions. 517-532
Mathematical Foundations
- Fangguo Zhang

, Zhijie Liu, Ping Wang, Haibo Tian:
Improving ECDLP Computation in Characteristic 2. 535-550 - Vladimir Edemskiy

, Nikita Sokolovskii:
Linear Complexity of New q-ary Generalized Cyclotomic Sequences of Period 2pn. 551-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














