Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Zhe Liu 0001, Johann Großschädl, Duncan S. Wong |
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mingjie Liu, Jiazhe Chen, Hexin Li |
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Moti Yung (eds.) |
Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Supervised Usage of Signature Creation Devices. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang |
Omega Pairing on Hyperelliptic Curves. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Gong, Bin Zhang 0003, Dengguo Feng, Tongjiang Yan |
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zou, Wenling Wu, Shuang Wu 0004 |
Cryptanalysis of the Round-Reduced GOST Hash Function. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0009, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Hu, Maozhi Xu |
The Gallant-Lambert-Vanstone Decomposition Revisited. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqian Li, Peng Wang 0009, Bao Li 0001, Zhelei Sun |
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chuankun Wu, Moti Yung, Dongdai Lin (eds.) |
Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang |
Improved Differential Cache Attacks on SMS4. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Subidh Ali, Debdeep Mukhopadhyay |
Differential Fault Analysis of Twofish. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Walter 0001, Stanislav Bulygin, Johannes Buchmann 0001 |
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tianze Wang, Meicheng Liu, Dongdai Lin |
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yang Li 0001, Kazuo Ohta, Kazuo Sakiyama |
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Chen 0008, Qingkuan Dong |
RCCA Security for KEM+DEM Style Hybrid Encryptions. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou |
A Robust Fuzzy Extractor without ECCs. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lidong Han, Wei Wei, Mingjie Liu |
On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi Khalfaoui, Refik Molva, Laurent Gomez |
Secure Product Tracking in Supply Chain. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yang Yu, Zhanfei Zhou |
An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lin Wang 0024, Zhi Hu |
New Sequences of Period p n and p n + 1 via Projective Linear Groups. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay |
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Teng Guo, Feng Liu 0001, Chuan Kun Wu |
Visual Cryptography for Natural Images and Visual Voting. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Risto M. Hakala, Atle Kivelä, Kaisa Nyberg |
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Moesfa Soeheila Mohamad, Geong Sen Poh |
Verifiable Structured Encryption. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shlomi Dolev, Nova Fandina, Ximing Li 0001 |
Nested Merkle's Puzzles against Sampling Attacks. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tao Shi, Vladimir Anashin, Dongdai Lin |
Fast Evaluation of T-Functions via Time-Memory Trade-Offs. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
A General Model for MAC Generation Using Direct Injection. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Ai Ren, Chengdong Tao |
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Duncan S. Wong, Roman Schlegel, Lam-for Kwok |
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li 0001 |
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Kan Yasuda |
The Security and Performance of "GCM" when Short Multiplications Are Used Instead. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhelei Sun, Peng Wang 0009, Liting Zhang |
Collision Attacks on Variant of OCB Mode and Its Series. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng |
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai |
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas |
Boosting Scalability in Anomaly-Based Packed Executable Filtering. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guifang Huang, Lei Hu |
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nan Li 0007, Yi Mu 0001, Willy Susilo |
Efficient Self-certified Signatures with Batch Verification. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhengjun Cao, Qian Sha, Xiao Fan |
Adleman-Manders-Miller Root Extraction Method Revisited. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ning Liu 0002, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao |
An Improved Electronic Voting Scheme without a Trusted Random Number Generator. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chenggen Song, Maozhi Xu, Chunming Tang 0001 |
Pseudorandom Generators Based on Subcovers for Finite Groups. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Weng, Yunqi Dou, Chuangui Ma, Nadia El Mrabet |
Fault Attacks against the Miller Algorithm in Hessian Coordinates. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gautham Sekar |
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zhou, Ji Xiang, Neng Gao |
Towards Attack Resilient Social Network Based Threshold Signing. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xianhui Lu, Bao Li 0001, Qixiang Mei, Yamin Liu |
Improved Tradeoff between Encapsulation and Decapsulation of HK09. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang 0012 |
Cryptanalysis of Reduced-Round KLEIN Block Cipher. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Teng Guo, Feng Liu 0001, Chuan Kun Wu |
Multi-pixel Encryption Visual Cryptography. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) |
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xusheng Zhang, Shan Chen, Dongdai Lin |
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Zhang 0001, Zhenfeng Zhang |
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu 0001 |
An Efficient RSA Implementation without Precomputation. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Zhang 0001, Xiang Xie, Rui Zhang 0002, Zhenfeng Zhang |
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yibin Dai, Shao-zhen Chen |
Weak-Key Class of MISTY1 for Related-Key Differential Attack. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicky Mouha, Qingju Wang 0001, Dawu Gu, Bart Preneel |
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Moti Yung |
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang |
Non-interactive Deniable Authentication Protocols. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen |
Cryptanalysis vs. Provable Security. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lin Wang 0024, Bing Shen, TongXu Qiao |
Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng |
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuejia Lai, Moti Yung, Dongdai Lin (eds.) |
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura |
Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. |
Inscrypt |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sourav Das, Dipanwita Roy Chowdhury |
An Efficient, Parameterized and Scalable S-box for Stream Ciphers. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta |
Rigorous Security Requirements for Designated Verifier Signatures. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shaoquan Jiang |
Dwork-Naor ZAP and Its Application in Deniable Authentication, Revisited. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li |
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette |
Characterization of the Electromagnetic Side Channel in Frequency Domain. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo |
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Weijia Wang, Lei Hu, Yong Li 0002 |
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gaoli Wang |
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qichun Wang, Thomas Johansson 0001 |
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lihua Wang 0001, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao 0001 |
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhanfei Zhou |
On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Bozhan Su |
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr |
Quasi-Dyadic CFS Signatures. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji |
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
On the CCA1-Security of Elgamal and Damgård's Elgamal. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002 |
Acquiring Key Privacy from Data Privacy. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001 |
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Hu, Maozhi Xu, Zhenghua Zhou |
A Generalization of Verheul's Theorem for Some Ordinary Curves. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhixiong Chen 0002, Xiangguo Cheng, Chenhuang Wu |
A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yilian Zhang, Zhide Chen, Fuchun Guo |
Online/Offline Verification of Short Signatures. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qi Chen, Dingyi Pei, Jun-Wu Dong |
Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Yang 0040, Lingyun Ying, Rui Wang 0032, Purui Su, Dengguo Feng |
DepSim: A Dependency-Based Malware Similarity Comparison System. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 |
Online/Offline Identity-Based Signcryption Revisited. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Gong, Qiang Tang 0001, Yee Wei Law, Hongyang Chen |
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang 0001 |
Pseudo-Cryptanalysis of Luffa. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen |
Variants of Multicollision Attacks on Iterated Hash Functions. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski |
Private Information Retrieval with a Trusted Hardware Unit - Revisited. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Haibo Tian, Fangguo Zhang, Yong Ding 0005 |
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Junqing Gong 0001, Haifeng Qian, Yuan Zhou 0008 |
Fully-Secure and Practical Sanitizable Signatures. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Palmieri 0001, Olivier Pereira |
Building Oblivious Transfer on Channel Delays. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret |
Algebraic Precomputations in Differential and Integral Cryptanalysis. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ying Liu, Fushan Wei, Chuangui Ma |
Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Atsuko Miyaji |
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu |
On Obfuscating Programs with Tamper-proof Hardware. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Le Kang, Ji Xiang |
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe |
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Liu 0001, Dawu Gu, Jing Zhang, Wei Li 0013 |
Differential-Multiple Linear Cryptanalysis. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|