default search action
Inscrypt 2016: Beijing, China
- Kefei Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10143, Springer 2017, ISBN 978-3-319-54704-6
Symmetric Ciphers
- Yafei Zheng, Wenling Wu:
Biclique Attack of Block Cipher SKINNY. 3-17 - Shaomei Wang, Tingting Cui, Meiqin Wang:
Improved Differential Cryptanalysis of CAST-128 and CAST-256. 18-32 - Wentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin:
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher. 33-46 - Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:
Impossible Differentials of SPN Ciphers. 47-63 - Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya:
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. 64-83 - Jialin Huang, Hailun Yan, Xuejia Lai:
Transposition of AES Key Schedule. 84-102 - Goutam Paul, Abhiroop Sanyal:
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. 103-116
Public-Key Cryptosystems
- Shiwei Zhang, Yi Mu, Guomin Yang:
Achieving IND-CCA Security for Functional Encryption for Inner Products. 119-139 - Liqiang Peng, Lei Hu, Yao Lu, Hongyun Wei:
An Improved Analysis on Three Variants of the RSA Cryptosystem. 140-149 - Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. 150-165
Signature and Authentication
- Aysajan Abidin:
On Privacy-Preserving Biometric Authentication. 169-186 - Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu:
A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. 187-204 - Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Identity-Based Blind Signature from Lattices in Standard Model. 205-218
Homomorphic Encryption
- Zengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du:
Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based. 221-242 - Jingguo Bi, Jiayang Liu, Xiaoyun Wang:
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. 243-252 - Seiko Arita, Shota Nakasato:
Fully Homomorphic Encryption for Point Numbers. 253-270
Leakage-Resilient
- Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:
Bounded-Retrieval Model with Keys Derived from Private Data. 273-290 - Wenpan Jing, Xianhui Lu, Bao Li:
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. 291-308 - Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Codes for Detection of Limited View Algebraic Tampering. 309-320
Post-quantum Cryptography
- Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani:
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography. 323-342 - Jinhui Liu, Huanguo Zhang, Jianwei Jia:
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. 343-354
Commitment and Protocol
- Xiaona Zhang, Li-Ping Wang:
Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial. 357-366 - Deepak Kumar Dalai, Pinaki Sarkar:
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks. 367-385 - Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang:
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. 386-400
Elliptic Curves
- Meng Zhang, Zhi Hu, Maozhi Xu:
On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1. 403-415 - Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He:
Constructing Isogenies on Extended Jacobi Quartic Curves. 416-427
Security and Implementation
- Cong Chen, Dongdai Lin:
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework. 431-450 - Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Jialu Hao, Ming Xian:
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment. 451-471 - Yu Wang, Yun Cao, Xianfeng Zhao:
Video Steganalysis Based on Centralized Error Detection in Spatial Domain. 472-483 - Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. 484-504 - Sumit Kumar Debnath, Ratna Dutta:
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter. 505-525 - Maciej Skorski:
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure. 526-541
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.