Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2010.bht:"
@proceedings{DBLP:conf/cisc/2010, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21518-6}, doi = {10.1007/978-3-642-21518-6}, isbn = {978-3-642-21517-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AlbrechtCDFP10, author = {Martin R. Albrecht and Carlos Cid and Thomas Dullien and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Algebraic Precomputations in Differential and Integral Cryptanalysis}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {387--403}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_27}, doi = {10.1007/978-3-642-21518-6\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AlbrechtCDFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BarretoCMN10, author = {Paulo S. L. M. Barreto and Pierre{-}Louis Cayrel and Rafael Misoczki and Robert Niebuhr}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Quasi-Dyadic {CFS} Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {336--349}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_23}, doi = {10.1007/978-3-642-21518-6\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BarretoCMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenCW10, author = {Zhixiong Chen and Xiangguo Cheng and Chenhuang Wu}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {95--104}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_7}, doi = {10.1007/978-3-642-21518-6\_7}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenM10, author = {Jiageng Chen and Atsuko Miyaji}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A New Practical Key Recovery Attack on the Stream Cipher {RC4} under Related-Key Model}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {62--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_5}, doi = {10.1007/978-3-642-21518-6\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenPD10, author = {Qi Chen and Dingyi Pei and Jun{-}Wu Dong}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {284--299}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_20}, doi = {10.1007/978-3-642-21518-6\_20}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenPD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenTZD10, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang and Yong Ding}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {415--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_29}, doi = {10.1007/978-3-642-21518-6\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChenTZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DasC10, author = {Sourav Das and Dipanwita Roy Chowdhury}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {An Efficient, Parameterized and Scalable S-box for Stream Ciphers}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {77--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_6}, doi = {10.1007/978-3-642-21518-6\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DasC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DesmedtM10, author = {Yvo Desmedt and Atsuko Miyaji}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {236--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_17}, doi = {10.1007/978-3-642-21518-6\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DesmedtM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DingG10, author = {Ning Ding and Dawu Gu}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {On Obfuscating Programs with Tamper-proof Hardware}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {487--502}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_34}, doi = {10.1007/978-3-642-21518-6\_34}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DingG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GongQZ10, author = {Junqing Gong and Haifeng Qian and Yuan Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Fully-Secure and Practical Sanitizable Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {300--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_21}, doi = {10.1007/978-3-642-21518-6\_21}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GongQZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GongTLC10, author = {Zheng Gong and Qiang Tang and Yee Wei Law and Hongyang Chen}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {268--283}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_19}, doi = {10.1007/978-3-642-21518-6\_19}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GongTLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuoMS10, author = {Fuchun Guo and Yi Mu and Willy Susilo}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {455--470}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_32}, doi = {10.1007/978-3-642-21518-6\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GuoMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuXZ10, author = {Zhi Hu and Maozhi Xu and Zhenghua Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A Generalization of Verheul's Theorem for Some Ordinary Curves}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {105--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_8}, doi = {10.1007/978-3-642-21518-6\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiaDHW10, author = {Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Pseudo-Cryptanalysis of Luffa}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {187--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_14}, doi = {10.1007/978-3-642-21518-6\_14}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/JiaDHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Jiang10, author = {Shaoquan Jiang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Dwork-Naor {ZAP} and Its Application in Deniable Authentication, \emph{Revisited}}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {443--454}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_31}, doi = {10.1007/978-3-642-21518-6\_31}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Jiang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KortelainenKH10, author = {Tuomas Kortelainen and Juha Kortelainen and Kimmo Halunen}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Variants of Multicollision Attacks on Iterated Hash Functions}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {139--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_11}, doi = {10.1007/978-3-642-21518-6\_11}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KortelainenKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KrzywieckiKMS10, author = {Lukasz Krzywiecki and Miroslaw Kutylowski and Hubert Misztela and Tomasz Struminski}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Private Information Retrieval with a Trusted Hardware Unit - Revisited}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {373--386}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_26}, doi = {10.1007/978-3-642-21518-6\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KrzywieckiKMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Lipmaa10, author = {Helger Lipmaa}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {18--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_2}, doi = {10.1007/978-3-642-21518-6\_2}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Lipmaa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuBZ10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Online/Offline Identity-Based Signcryption Revisited}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {36--51}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_3}, doi = {10.1007/978-3-642-21518-6\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuBZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuWM10, author = {Ying Liu and Fushan Wei and Chuangui Ma}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {255--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_18}, doi = {10.1007/978-3-642-21518-6\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MeynardRGFDV10, author = {Olivier Meynard and Denis R{\'{e}}al and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Characterization of the Electromagnetic Side Channel in Frequency Domain}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {471--486}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_33}, doi = {10.1007/978-3-642-21518-6\_33}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MeynardRGFDV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/OhtaharaSS10, author = {Chiaki Ohtahara and Yu Sasaki and Takeshi Shimoyama}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Preimage Attacks on Step-Reduced {RIPEMD-128} and {RIPEMD-160}}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {169--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_13}, doi = {10.1007/978-3-642-21518-6\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/OhtaharaSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PalmieriP10, author = {Paolo Palmieri and Olivier Pereira}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Building Oblivious Transfer on Channel Delays}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {125--138}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_10}, doi = {10.1007/978-3-642-21518-6\_10}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PalmieriP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador and Tieyan Li}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication Protocol}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {427--442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_30}, doi = {10.1007/978-3-642-21518-6\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Peris-LopezCPEL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Wang10, author = {Gaoli Wang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Distinguishing Attacks on {LPMAC} Based on the Full {RIPEMD} and Reduced-Step RIPEMD-\{256, 320\}}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {199--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_15}, doi = {10.1007/978-3-642-21518-6\_15}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHL10, author = {Weijia Wang and Lei Hu and Yong Li}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {218--235}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_16}, doi = {10.1007/978-3-642-21518-6\_16}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangJ10, author = {Qichun Wang and Thomas Johansson}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A Note on Fast Algebraic Attacks and Higher Order Nonlinearities}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {404--414}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_28}, doi = {10.1007/978-3-642-21518-6\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangWCOS10, author = {Lihua Wang and Licheng Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_1}, doi = {10.1007/978-3-642-21518-6\_1}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangWCOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuFWS10, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Bozhan Su}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Hyper-Sbox View of AES-like Permutations: {A} Generalized Distinguisher}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {155--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_12}, doi = {10.1007/978-3-642-21518-6\_12}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuFWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangYWSF10, author = {Yi Yang and Lingyun Ying and Rui Wang and Purui Su and Dengguo Feng}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {DepSim: {A} Dependency-Based Malware Similarity Comparison System}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {503--522}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_35}, doi = {10.1007/978-3-642-21518-6\_35}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangYWSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YoneyamaUO10, author = {Kazuki Yoneyama and Mebae Ushida and Kazuo Ohta}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Rigorous Security Requirements for Designated Verifier Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {318--335}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_22}, doi = {10.1007/978-3-642-21518-6\_22}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YoneyamaUO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Zhang10, author = {Rui Zhang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Acquiring Key Privacy from Data Privacy}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {359--372}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_25}, doi = {10.1007/978-3-642-21518-6\_25}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangCG10, author = {Yilian Zhang and Zhide Chen and Fuchun Guo}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Online/Offline Verification of Short Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {350--358}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_24}, doi = {10.1007/978-3-642-21518-6\_24}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Zhou10, author = {Zhanfei Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {115--124}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_9}, doi = {10.1007/978-3-642-21518-6\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhuB10, author = {Huafei Zhu and Feng Bao}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {52--61}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_4}, doi = {10.1007/978-3-642-21518-6\_4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhuB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.