


default search action
20th Inscrypt 2024: Kunming, China - Part I
- Dongdai Lin, Meiqin Wang, Moti Yung:
Information Security and Cryptology - 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15543, Springer 2025, ISBN 978-981-96-4730-9
Big Data and Cloud Security
- Zongmin Wang, Qiang Wang, Fucai Zhou, Jian Xu:
Revocable Registered Attribute-Based Keyword Search Supporting Fairness. 3-23 - Siyuan Ma, Yuewu Wang, Chunjing Kou, Peng Wang, Haotian Shi, Jiwu Jing:
HiddenStor: A Steganographic Storage System Built on Secret Sharing. 24-41 - Chenchen Wu, Weijing You, Li Xu:
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous. 42-62
Foundations of Cryptography
- Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren:
On the Relationship Between Public Key Primitives via Indifferentiability. 65-85 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions. 86-105 - Ziyi Li, Ruida Wang, Xianhui Lu, Yao Cheng, Liming Gao:
From Signature with Re-randomizable Keys: Generic Construction of PDPKS. 106-125
Implementation of Cryptosystems
- Luoqi Chen, Yufeng Tang, Liangju Zhao, Zheng Gong:
SIMD Optimizations of White-Box Block Cipher Implementations with the Self-equivalence Framework. 129-149 - Shilong You, Jianfeng Du, Zhu Wang, Aimin Yu:
When Is Multi-channel Better Than Single-Channel: A Case Study of Product-Based Multi-channel Fusion Attacks. 150-169
Key Exchange
- Li Duan, Yong Li:
Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration Privacy. 173-192 - Zhiwei Li, Jun Xu, Lei Hu:
An Improved Signal Leakage Attack Against DXL Key Exchange Protocol. 193-210 - Jiahao Liu, Yi Wang, Rongmao Chen, Xincheng Tang, Jinshu Su:
srCPace: Universally Composable PAKE with Subversion-Resilience. 211-231
AI and Security
- Haoyang Lu, Rui Zhang, Tong Kong:
Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT. 235-254 - Yifei Zhang, Zhenduo Hou, Yunkai Zou, Zhen Li, Ding Wang:
EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning. 255-276 - Hongyu Yang, Yunlong Wang, Ze Hu, Xiang Cheng:
A Binary Code Similarity Detection Method Based on Multi-source Contrastive Learning. 277-295 - Lixia Xie, Chenyang Wei, Hongyu Yang, Ze Hu, Xiang Cheng:
Malware Detection Method Based on Image Sample Reconstruction and Feature Enhancement. 296-315
Security Analysis
- Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen:
Attention-Based Decompilation Through Neural Machine Translation. 319-339 - Linyu Li, Lei Yu, Qingli Guo, Ruixuan Zhang, Can Yang, Jun Guan, Xiaorui Gong:
DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware. 340-359
Privacy-Enhancing Technologies
- Jiangang Lu, Yunfan Yang, Qinqin Wu, Benhan Li, Mingxin Lu:
Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid. 363-380 - Birou Gao, Rui Zhang, Yuting Xiao, Huan Zou:
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets. 381-402 - Hongfa Ding, Peiwang Fu, Heling Jiang, Xuesong Li, Linjiang Wu:
Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential Privacy. 403-423
Watermarking
- Siyuan Yu, Ziqi Zhu, Rupeng Yang, Junqing Gong:
Public-Key Watermarkable PRFs with Dynamic Bounded Collusion. 427-443 - Wenhao Xu, Hequn Xian:
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning. 444-460 - Yuhao Lian, Ying Ouyang, Songsong Li, Deng Tang:
CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-Knowledge Proof. 461-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.