


default search action
Inscrypt 2014: Beijing, China
- Dongdai Lin, Moti Yung, Jianying Zhou

:
Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8957, Springer 2015, ISBN 978-3-319-16744-2
Privacy and Anonymity
- Weiwei Liu, Yi Mu, Guomin Yang

:
An Efficient Privacy-Preserving E-coupon System. 3-15 - Paolo Palmieri

, Luca Calderoni
, Dario Maio:
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. 16-36 - Tao Zhang, Sherman S. M. Chow

:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. 37-48
Multiparty and Outsource Computation
- James Alderman, Christian Janson, Carlos Cid, Jason Crampton:

Revocation in Publicly Verifiable Outsourced Computation. 51-71 - Constantinos Patsakis

, Michael Clear, Paul Laird:
Private Aggregation with Custom Collusion Tolerance. 72-89
Signature and Security Protocols
- Fei Tang, Hongda Li:

Ring Signatures of Constant Size Without Random Oracles. 93-108 - Vandana Guleria, Ratna Dutta:

Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control. 109-129 - Ning Ding:

Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge. 130-149 - Denisse Muñante Arzapalo

, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté
:
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC. 150-169 - Ioana Boureanu, Serge Vaudenay:

Optimal Proximity Proofs. 170-190
Lattice and Public Key Cryptography
- Bei Liang, Rui Zhang, Hongda Li:

Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. 193-206 - Zhangjie Huang, Lei Hu, Jun Xu:

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization. 207-219 - Fuqun Wang, Kunpeng Wang:

Fully Homomorphic Encryption with Auxiliary Inputs. 220-238 - Russell W. F. Lai, Henry K. F. Cheung

, Sherman S. M. Chow
:
Trapdoors for Ideal Lattices with Applications. 239-256
Block Cipher and Hash Function
- Zhenzhen Bao

, Wentao Zhang, Dongdai Lin:
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. 259-285 - Yonglin Hao:

The Boomerang Attacks on BLAKE and BLAKE2. 286-310 - Riham AlTawy, Amr M. Youssef:

Second Preimage Analysis of Whirlwind. 311-328 - Hongbo Yu, Dongxia Bai:

Boomerang Attack on Step-Reduced SHA-512. 329-342 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya

:
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique. 343-360 - Donghoon Chang, Arpan Jati, Sweta Mishra

, Somitra Kumar Sanadhya
:
Rig: A Simple, Secure and Flexible Design for Password Hashing. 361-381
Authentication and Encryption
- Debjyoti Bhattacharjee

, Anupam Chattopadhyay:
Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption. 385-402 - Zhen Liu, Zhenfu Cao

, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. 403-423 - Changji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi:

Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks. 424-442
Elliptic Curve
- Jean-Marc Robert:

Parallelized Software Implementation of Elliptic Curve Scalar Multiplication. 445-462 - Song Tian, Kunpeng Wang, Bao Li, Wei Yu:

A Note on Diem's Proof. 463-471
Cryptographic Primitive and Application
- Lucjan Hanzlik, Przemyslaw Kubiak

, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. 475-495 - Guillermo Suarez-Tangil

, Juan E. Tapiador
, Pedro Peris-Lopez
:
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. 496-515 - Hongliang Liang, Changyao Han, Daijie Zhang, Dongyang Wu:

A Lightweight Security Isolation Approach for Virtual Machines Deployment. 516-529 - Neel Bedekar, Chiranjit Shee:

A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors. 530-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














