


default search action
18th Inscrypt 2022: Beijing, China
- Yi Deng, Moti Yung

:
Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13837, Springer 2023, ISBN 978-3-031-26552-5
Block Ciphers
- Xin Miao, Chun Guo, Meiqin Wang, Weijia Wang:

How Fast Can SM4 be in Software? 3-22 - Lei Zhang

, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu:
LLLWBC: A New Low-Latency Light-Weight Block Cipher. 23-42 - Weiwei Cao, Wentao Zhang, Chunning Zhou:

New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits. 43-63
Public Key Encryption & Signature
- Min Zhang, Binbin Tu

, Yu Chen:
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature. 67-86 - Wenqiu Ma, Rui Zhang:

SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications. 87-107 - Wenshuo Guo, Fangwei Fu:

McEliece-Type Encryption Based on Gabidulin Codes with No Hidden Structure. 108-126
Quantum
- Chengkai Zhu

, Zhenyu Huang
:
Optimizing the Depth of Quantum Implementations of Linear Layers. 129-147 - Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:

IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. 148-166
MPC
- You Chen, Ning Ding, Dawu Gu, Yang Bian:

Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion. 169-191 - Cong Zhang

, Shuaishuai Li, Dongdai Lin:
Amortizing Division and Exponentiation. 192-210
Cryptanalysis
- Chenmeng Li, Baofeng Wu

, Dongdai Lin:
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT. 213-233 - Lulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin:

Cryptanalysis of Ciminion. 234-251 - Tianyou Ding, Wentao Zhang, Chunning Zhou:

Clustering Effect of Iterative Differential and Linear Trails. 252-271 - Qingyuan Yu

, Keting Jia
, Guangnan Zou, Guoyan Zhang:
Differential Cryptanalysis of Round-Reduced SPEEDY Family. 272-291
Mathematical Aspects of Crypto
- Luying Li, Wei Yu:

A Note on Inverted Twisted Edwards Curve. 295-304 - Xiao Li, Wei Yu, Yuqing Zhu, Zhizhong Pan:

Efficiently Computable Complex Multiplication of Elliptic Curves. 305-317 - Yanan Wu, Nian Li, Xiangyong Zeng, Yuhua Cai:

Several Classes of Niho Type Boolean Functions with Few Walsh Transform Values. 318-333
Stream Ciphers
- Bohan Li, Hailong Zhang, Dongdai Lin:

Higher-Order Masking Scheme for Trivium Hardware Implementation. 337-356 - Cheng Che, Tian Tian:

An Experimentally Verified Attack on 820-Round Trivium. 357-369
Malware
- Yunfan Li, Lingjing Yu, Qingyun Liu:

HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification. 373-390 - Qintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen, Yuqing Zhang:

Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns. 391-407 - Qi Wang, Wenxin Li, Kang Yang, Yiru Zhao, Lei Zhao, Lina Wang:

Efficient DNN Backdoor Detection Guided by Static Weight Analysis. 408-428 - Jing Li

, Sisi Zhang
, Xingbin Wang
, Rui Hou
:
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans. 429-444
Lattices
- Zhili Dong, Shixin Tian, Kunpeng Wang, Chang Lv:

Subfield Attacks on HSVP in Ideal Lattices. 447-462 - Zishen Zhao, Guangwu Xu:

On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices. 463-482 - Jing Gao, Jun Xu, Lei Hu:

Inferring Sequences Produced by the Quadratic Generator. 483-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














