


default search action
20th Inscrypt 2024: Kunming, China - Part II
- Dongdai Lin, Meiqin Wang, Moti Yung:
Information Security and Cryptology - 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II. Lecture Notes in Computer Science 15544, Springer 2025, ISBN 978-981-96-4733-0
Public Key Cryptosystems
- Ismail Afia
, Riham AlTawy
:
Extended Policy-Based Sanitizable Signatures. 3-22 - Siyue Yao, Zhikang Xie, Man Ho Au:
Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations. 23-43 - Futai Zhang, Yichi Huang, Wenjie Yang, Jinmei Tian:
Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage. 44-65 - Hao Kang, Mengce Zheng
:
Generalized Cryptanalysis of Cubic Pell RSA. 66-85 - George Teseleanu
:
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms. 86-106 - Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian:
Hierarchical Functional Encryption for Quadratic Transformation. 107-126 - Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan:
Solving Modular Linear Equations via Automated Coppersmith and Its Applications. 127-146 - Huixuan Jin, Cong Peng
, Jintao Fu, Min Luo:
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography. 147-167
Security Protocols Analysis
- Yu Wang:
Permutation Argument via Bases Transformation. 171-190 - Ziqing Guo, Yaohui Wang, Xuanyu Jin, Xiuhua Wang, Yuanyuan He, Yueyue Dai:
Efficient and Verifiable Multi-server Framework for Secure Information Classification and Storage. 191-210 - Zhongqi Lv, Hui Li, Haisong Ye, Chi Ma, Jingjing Guan:
Formal Analysis of WAPI Authentication and Key Agreement Protocol. 211-234
Symmetric Cryptanalysis
- Xueqi Zhu, Yan Jia, Jun Xu, Peng Wang:
Committing Security of AEAD Based on Stream Cipher. 237-256 - Xinming Zhu, Shihui Zheng, Zihao Han:
Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method. 257-277 - Yanqi Chen, Ting Li, Yao Sun:
Cube Attacks Against Trivium, Kreyvium and ACORN with Practical Complexity. 278-300 - Jingsui Weng, Wentao Zhang, Ting Peng, Tianyou Ding:
Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers. 301-321 - Jiahao Zhao, Qianqian Yang, Ling Song, Lei Hu:
A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT. 322-341 - Hongtao Hu, Chenhao Jia, Qing Ling, Sijia Gong, Ting Wu, Tingting Cui:
An Automatic Search Method for 4-Bit Optimal S-Boxes Towards Considering Cryptographic Properties and Hardware Area Simultaneously. 342-360 - Shiqi Hou, Muzhou Li, Kai Hu, Shichang Wang, Bart Preneel:
Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations - Improved Attacks on TWINE and LBlock. 361-381 - Shengyuan Xu, Siwei Chen, Xiutao Feng, Zejun Xiang, Xiangyong Zeng:
Cryptanalysis of BAKSHEESH Block Cipher. 382-402
Quantum and Post Quantum Cryptography
- Boyun Li
, Qun Liu
:
Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack. 405-424 - Jingwen Chen
, Qun Liu
, Boyun Li
, Jingbo Qiao, Jinliang Wang:
Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE. 425-443 - Tao-Yun Wang, Shuai-Yu Chen, Lu Li, Weijia Wang:
Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON Digital Signature. 444-463 - Tianshu Shan
, Shujiao Cao
, Rui Xue
:
Quantum Public-Key Encryption of Quantum States, and More. 464-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.