


default search action
17th Inscrypt 2021: Virtual Event
- Yu Yu

, Moti Yung
:
Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13007, Springer 2021, ISBN 978-3-030-88322-5
Signatures
- George Teseleanu

:
Concurrent Signatures from a Variety of Keys. 3-22 - Jie Song, Yunhua Wen:

A Generic Construction of Fuzzy Signature. 23-41 - Mohamed Nassurdine, Huang Zhang

, Fangguo Zhang
:
Identity Based Linkable Ring Signature with Logarithmic Size. 42-60 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:

Security Analysis of DGM and GM Group Signature Schemes Instantiated with XMSS-T. 61-81
System Security
- Geng Li, Jianwei Liu, Zongyang Zhang, Yanting Zhang:

UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module. 85-110 - Loïs Huguenin-Dumittan, Iraklis Leontiadis:

A Message Franking Channel. 111-128 - Yunlong Lyu

, Wang Gao, Siqi Ma
, Qibin Sun, Juanru Li:
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation. 129-148
Symmetric Cryptanalysis
- Laila El Aimani

:
A New Approach for Finding Low-Weight Polynomial Multiples. 151-170 - Shichang Wang, Shiqi Hou, Meicheng Liu, Dongdai Lin:

Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT. 171-190 - Mingxing Wang, Yonglin Hao:

Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1. 191-211 - Chunlei Hong, Shasha Zhang, Siwei Chen, Da Lin

, Zejun Xiang
:
More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers. 212-232
Asymmetric Cryptanalysis
- Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. 235-250 - Shuaigang Li, Shuqin Fan, Xianhui Lu:

Attacking ECDSA Leaking Discrete Bits with a More Efficient Lattice. 251-266
Cryptographic Protocols
- Hongrui Cui, Kaiyi Zhang:

A Simple Post-Quantum Non-interactive Zero-Knowledge Proof from Garbled Circuits. 269-280 - Yi Liu

, Qi Wang
, Siu-Ming Yiu:
Improved Zero-Knowledge Argument of Encrypted Extended Permutation. 281-298
Mathematical Foundations
- Wenhui Kong, Jianghua Zhong, Dongdai Lin:

Isomorphism and Equivalence of Galois Nonlinear Feedback Shift Registers. 301-315 - Zhizhong Pan, Xiao Li:

Elliptic Curve and Integer Factorization. 316-330 - Yangpan Zhang, Maozhi Xu:

On the Linear Complexity of Feedforward Clock-Controlled Sequence. 331-348
Symmetric Cryptography
- Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:

On Characterization of Transparency Order for (n, m)-functions. 351-370 - Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi:

Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). 371-383 - Xueping Yan, Lin Tan, Hong Xu, Wenfeng Qi:

On the Provable Security Against Truncated Impossible Differential Cryptanalysis for AES in the Master-Key Setting. 384-398 - Yufeng Tang

, Zheng Gong, Tao Sun, Jinhai Chen, Fan Zhang:
Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher Implementations. 399-417
Public Key Cryptography
- Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:

Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. 421-441 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:

Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices. 442-465 - Ruiqi Li

, Chunfu Jia
:
Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme. 466-484
Real World Cryptography
- Wenyuan Li, Wei Wang, Jingqiang Lin, Qiongxiao Wang, Wenjie Wang

:
Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance. 487-506 - Liam Medley

, Elizabeth A. Quaglia
:
Collaborative Verifiable Delay Functions. 507-530 - Wenjie Wang

, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, Qiongxiao Wang:
SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC. 531-550

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














