default search action
Inscrypt 2014: Beijing, China
- Dongdai Lin, Moti Yung, Jianying Zhou:
Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8957, Springer 2015, ISBN 978-3-319-16744-2
Privacy and Anonymity
- Weiwei Liu, Yi Mu, Guomin Yang:
An Efficient Privacy-Preserving E-coupon System. 3-15 - Paolo Palmieri, Luca Calderoni, Dario Maio:
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. 16-36 - Tao Zhang, Sherman S. M. Chow:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. 37-48
Multiparty and Outsource Computation
- James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Revocation in Publicly Verifiable Outsourced Computation. 51-71 - Constantinos Patsakis, Michael Clear, Paul Laird:
Private Aggregation with Custom Collusion Tolerance. 72-89
Signature and Security Protocols
- Fei Tang, Hongda Li:
Ring Signatures of Constant Size Without Random Oracles. 93-108 - Vandana Guleria, Ratna Dutta:
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control. 109-129 - Ning Ding:
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge. 130-149 - Denisse Muñante Arzapalo, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté:
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC. 150-169 - Ioana Boureanu, Serge Vaudenay:
Optimal Proximity Proofs. 170-190
Lattice and Public Key Cryptography
- Bei Liang, Rui Zhang, Hongda Li:
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. 193-206 - Zhangjie Huang, Lei Hu, Jun Xu:
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization. 207-219 - Fuqun Wang, Kunpeng Wang:
Fully Homomorphic Encryption with Auxiliary Inputs. 220-238 - Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow:
Trapdoors for Ideal Lattices with Applications. 239-256
Block Cipher and Hash Function
- Zhenzhen Bao, Wentao Zhang, Dongdai Lin:
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. 259-285 - Yonglin Hao:
The Boomerang Attacks on BLAKE and BLAKE2. 286-310 - Riham AlTawy, Amr M. Youssef:
Second Preimage Analysis of Whirlwind. 311-328 - Hongbo Yu, Dongxia Bai:
Boomerang Attack on Step-Reduced SHA-512. 329-342 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique. 343-360 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A Simple, Secure and Flexible Design for Password Hashing. 361-381
Authentication and Encryption
- Debjyoti Bhattacharjee, Anupam Chattopadhyay:
Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption. 385-402 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. 403-423 - Changji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi:
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks. 424-442
Elliptic Curve
- Jean-Marc Robert:
Parallelized Software Implementation of Elliptic Curve Scalar Multiplication. 445-462 - Song Tian, Kunpeng Wang, Bao Li, Wei Yu:
A Note on Diem's Proof. 463-471
Cryptographic Primitive and Application
- Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. 475-495 - Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. 496-515 - Hongliang Liang, Changyao Han, Daijie Zhang, Dongyang Wu:
A Lightweight Security Isolation Approach for Virtual Machines Deployment. 516-529 - Neel Bedekar, Chiranjit Shee:
A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors. 530-546
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.