Stop the war!
Остановите войну!
for scientists:
default search action
15th Inscrypt 2019: Nanjing, China
- Zhe Liu, Moti Yung:
Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12020, Springer 2020, ISBN 978-3-030-42920-1
Invited Paper
- Xinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu:
Revocable and Linkable Ring Signature. 3-27
Post-Quantum Cryptography
- Yingshan Yang, Xiaozhuo Gu, Bin Wang, Taizhong Xu:
Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus. 31-49 - Dung Hoang Duong, Willy Susilo, Minh Kim Bui, Thanh Xuan Khuc:
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model. 50-65 - Jie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li:
Attribute-Based Keyword Search from Lattices. 66-85 - Tomoki Moriya, Katsuyuki Takashima, Tsuyoshi Takagi:
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. 86-98
AI Security
- Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen:
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems. 101-117 - Weiqing Huang, Xiao Peng, Zhixin Shi:
A SeqGAN-Based Method for Mimicking Attack. 118-133 - Yuyue Zhao, Yangyang Li, Tengfei Yang, Haiyong Xie:
Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning. 134-153
Systems Security
- Yueyao Chen, Qianjun Liu, Tianyu Du, Yuan Chen, Shouling Ji:
Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy. 157-172 - Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji:
Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. 173-198 - Qiang Tang:
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service. 199-207 - Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo:
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones. 208-224 - Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:
SymSem: Symbolic Execution with Time Stamps for Deobfuscation. 225-245 - Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang:
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS. 246-259 - Senshan Pan, Zhuhua Li, Liangmin Wang:
Improving Division Property Based Cube Attacks by Removing Invalid Monomials. 260-276 - Houhua He, Lei Yu, Weixia Cai, Xiaoyu Wang, Xiaorui Gong, Haoyu Wang, Chen Liu:
PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework. 277-290 - Xueyi Yang, Na Lv, Tianyu Chen, Cunqing Ma, Limin Liu:
A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System. 291-308 - Jun Zhao, Jiangshan Yu, Joseph K. Liu:
Consolidating Hash Power in Blockchain Shards with a Forest. 309-322
Side Channel Attacks
- Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:
Evaluating the Cache Side Channel Attacks Against ECDSA. 325-345 - Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama:
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor. 346-361
Identity-Based Cryptography
- Mriganka Mandal, Ratna Dutta:
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. 365-380 - Xuecheng Ma, Dongdai Lin:
Generic Constructions of Revocable Identity-Based Encryption. 381-396 - Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. 397-415
Signatures
- Mahender Kumar, Satish Chand:
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services. 419-434 - Tingting Lu, Jiangtao Li, Lei Zhang, Kwok-Yan Lam:
Group Signatures with Decentralized Tracing. 435-442 - Jiahui Chen, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan:
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature. 443-451 - Swati Rawal, Sahadeo Padhye:
Untraceability of Partial Blind and Blind Signature Schemes. 452-459
Cryptanalysis
- Zhichao Xu, Hong Xu, Xuejia Lai:
Improved Integral Attack on Generalized Feistel Cipher. 463-479 - Xiaoxuan Lou, Fan Zhang, Guorui Xu, Ziyuan Liang, Xinjie Zhao, Shize Guo, Kui Ren:
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance. 480-496
Authentication
- Qihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei:
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model. 499-516 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions. 517-532
Mathematical Foundations
- Fangguo Zhang, Zhijie Liu, Ping Wang, Haibo Tian:
Improving ECDLP Computation in Characteristic 2. 535-550 - Vladimir Edemskiy, Nikita Sokolovskii:
Linear Complexity of New q-ary Generalized Cyclotomic Sequences of Period 2pn. 551-559
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.