- 2009
- Moti Yung, Peng Liu, Dongdai Lin:
Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5487, Springer 2009, ISBN 978-3-642-01439-0 [contents] - 2008
- Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Security Analysis of Multivariate Polynomials for Hashing. Inscrypt 2008: 115-124 - Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. Inscrypt 2008: 265-274 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180 - Lingli Deng, Yeping He, Ziyao Xu:
Separation of Duty in Trust-Based Collaboration. Inscrypt 2008: 370-388 - Mahabir Prasad Jhanwar, Rana Barua:
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. Inscrypt 2008: 314-331 - Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Inscrypt 2008: 240-252 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles. Inscrypt 2008: 47-59 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Inscrypt 2008: 289-304 - Mengjun Li, Ti Zhou, Zhoujun Li:
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. Inscrypt 2008: 125-140 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21 - Tong-Lee Lim, Tieyan Li, Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols. Inscrypt 2008: 406-424 - Peng Liu:
Secure and Privacy-Preserving Information Brokering. Inscrypt 2008: 22 - Duo Liu, Zhiyong Tan, Yiqi Dai:
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. Inscrypt 2008: 253-264 - Ningbo Mu, Yupu Hu, Leyou Zhang:
On the Computational Efficiency of XTR+. Inscrypt 2008: 305-313 - Kun Peng, Feng Bao:
Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156 - Kun Peng, Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437 - Bart Preneel:
The State of Hash Functions and the NIST SHA-3 Competition. Inscrypt 2008: 1-11 - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 - Sushmita Ruj, Bimal K. Roy:
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. Inscrypt 2008: 275-288 - Qiang Tang, Pieter H. Hartel, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347 - Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. Inscrypt 2008: 96-114 - Xu An Wang, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. Inscrypt 2008: 217-239 - Huaqun Wang, Hong Yu:
Cryptanalysis of Two Ring Signcryption Schemes. Inscrypt 2008: 41-46 - Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo:
Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 - Ziyao Xu, Yeping He, Lingli Deng:
An Integrity Assurance Mechanism for Run-Time Programs. Inscrypt 2008: 389-405 - Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Inscrypt 2008: 201-216 - Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan:
Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. Inscrypt 2008: 192-200 - Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369 - Wenying Zhang, Jing Han:
Impossible Differential Analysis of Reduced Round CLEFIA. Inscrypt 2008: 181-191