


default search action
20th Inscrypt 2024: Kunming, China - Part II
- Dongdai Lin, Meiqin Wang, Moti Yung:

Information Security and Cryptology - 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II. Lecture Notes in Computer Science 15544, Springer 2025, ISBN 978-981-96-4733-0
Public Key Cryptosystems
- Ismail Afia

, Riham AlTawy
:
Extended Policy-Based Sanitizable Signatures. 3-22 - Siyue Yao, Zhikang Xie, Man Ho Au:

Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations. 23-43 - Futai Zhang, Yichi Huang, Wenjie Yang, Jinmei Tian:

Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage. 44-65 - Hao Kang, Mengce Zheng

:
Generalized Cryptanalysis of Cubic Pell RSA. 66-85 - George Teseleanu

:
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms. 86-106 - Jun Zhao, Kai Zhang

, Junqing Gong, Haifeng Qian:
Hierarchical Functional Encryption for Quadratic Transformation. 107-126 - Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan:

Solving Modular Linear Equations via Automated Coppersmith and Its Applications. 127-146 - Huixuan Jin, Cong Peng

, Jintao Fu, Min Luo:
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography. 147-167
Security Protocols Analysis
- Yu Wang:

Permutation Argument via Bases Transformation. 171-190 - Ziqing Guo, Yaohui Wang, Xuanyu Jin, Xiuhua Wang, Yuanyuan He, Yueyue Dai:

Efficient and Verifiable Multi-server Framework for Secure Information Classification and Storage. 191-210 - Zhongqi Lv, Hui Li, Haisong Ye, Chi Ma, Jingjing Guan:

Formal Analysis of WAPI Authentication and Key Agreement Protocol. 211-234
Symmetric Cryptanalysis
- Xueqi Zhu, Yan Jia, Jun Xu, Peng Wang:

Committing Security of AEAD Based on Stream Cipher. 237-256 - Xinming Zhu, Shihui Zheng, Zihao Han:

Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method. 257-277 - Yanqi Chen, Ting Li, Yao Sun:

Cube Attacks Against Trivium, Kreyvium and ACORN with Practical Complexity. 278-300 - Jingsui Weng, Wentao Zhang, Ting Peng, Tianyou Ding:

Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers. 301-321 - Jiahao Zhao, Qianqian Yang, Ling Song, Lei Hu:

A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT. 322-341 - Hongtao Hu, Chenhao Jia, Qing Ling, Sijia Gong, Ting Wu, Tingting Cui:

An Automatic Search Method for 4-Bit Optimal S-Boxes Towards Considering Cryptographic Properties and Hardware Area Simultaneously. 342-360 - Shiqi Hou, Muzhou Li, Kai Hu, Shichang Wang, Bart Preneel:

Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations - Improved Attacks on TWINE and LBlock. 361-381 - Shengyuan Xu

, Siwei Chen, Xiutao Feng, Zejun Xiang, Xiangyong Zeng:
Cryptanalysis of BAKSHEESH Block Cipher. 382-402
Quantum and Post Quantum Cryptography
- Boyun Li

, Qun Liu
:
Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack. 405-424 - Jingwen Chen

, Qun Liu
, Boyun Li
, Jingbo Qiao, Jinliang Wang:
Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE. 425-443 - Tao-Yun Wang, Shuai-Yu Chen, Lu Li, Weijia Wang:

Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON Digital Signature. 444-463 - Tianshu Shan

, Shujiao Cao
, Rui Xue
:
Quantum Public-Key Encryption of Quantum States, and More. 464-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














