


default search action
19th Inscrypt 2023: Hangzhou, China - Part II
- Chunpeng Ge, Moti Yung

:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14527, Springer 2024, ISBN 978-981-97-0944-1
System Security
- Yi Jiang

, Chenghui Shi, Oubo Ma
, Youliang Tian, Shouling Ji:
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models. 3-23 - Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Laiwei Jiang, Xiang Cheng:

An Android Malware Detection Method Using Better API Contextual Information. 24-36 - Changzhi Zhao, Kezhen Huang, Di Wu, Xueying Han, Dan Du, Yutian Zhou, Zhigang Lu, Yuling Liu:

TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method. 37-52 - Dong Chen

, Zhiyuan Qiu, Guangwu Xu:
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations. 53-72 - Zhou Tan, Ximeng Liu, Yan Che, Yuyang Wang:

Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing. 73-90 - Tingchao Fu, Fanxiao Li, Jinhong Zhang, Liang Zhu, Yuanyu Wang, Wei Zhou:

TIA: Token Importance Transferable Attack on Vision Transformers. 91-107
Cryptography Engineering
- Hang Yang, Rongmao Chen, Qiong Wang, Zixuan Wu, Wei Peng:

Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber. 111-129 - Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:

V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. 130-149
Cryptanalysis
- Yi Guo, Danping Shi, Lei Hu, Yin Lv:

Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra. 153-171 - Huina Li

, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu:
Automatic Search of Linear Structure: Applications to Keccak and Ascon. 172-192 - Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi:

Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128. 193-208 - Qingfeng Cheng

, Chunzhi Zhao, Jinzheng Cao
, Fushan Wei
:
Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound. 209-229 - Zhuolong Zhang

, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2. 230-250 - Zhen Yang, Jing Li, Fei Cui, Jia Qi Liu, Yu Cheng, Xi Nan Tang, Shuai Gui:

Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis. 251-271 - Anit Kumar Ghosal

, Dipanwita Roychowdhury
:
Non-malleable Codes from Leakage Resilient Cryptographic Primitives. 272-290
Short Papers
- Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:

DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. 293-304 - Xin Sun, Anran Cui, Hui Chen, Xingchi Su

:
A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles. 305-316 - Qingfeng Cheng

, Jinzheng Cao
, Xiangyang Luo:
Quantum Augmented Lattice Attack on NTRU with Side Information. 317-328 - Bo Yu

, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun:
Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm. 329-342 - Yu Song, Yu Long, Xian Xu, Dawu Gu:

FaBFT: Flexible Asynchronous BFT Protocol Using DAG. 343-355 - Husheng Yang, Sha Ma, Pan Zhou, Guiquan Yang, Qiong Huang:

Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search. 356-367 - Peiyi Tu, Xingjun Wang:

Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments. 368-386
Poster
- Changsong Jiang

, Chunxiang Xu, Kefei Chen:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things. 389-393 - Renhua Xie, Xuxin Fang, Bo Ma, Chuanhuang Li, Xiaoyong Yuan

:
TRGE: A Backdoor Detection After Quantization. 394-398 - Benqiang Wei, Xianhui Lu:

Improved Homomorphic Evaluation for Hash Function Based on TFHE. 399-402 - Ziyi Li

, Xianhui Lu, Yao Cheng, Bao Li:
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM. 403-406 - Mengce Zheng

:
Partial Key Exposure Attack on Common Prime RSA. 407-410 - Linghui Chen, Zhiguo Wan, Jun Zhou, Carvajal Roca Ivan Edmar:

An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth. 411-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














