Search dblp for Publications

export results for "toc:db/conf/cisc/inscrypt2013.bht:"

 download as .bib file

@proceedings{DBLP:conf/cisc/2013,
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12087-4},
  doi          = {10.1007/978-3-319-12087-4},
  isbn         = {978-3-319-12086-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CaoLM13,
  author       = {Zhengjun Cao and
                  Fr{\'{e}}d{\'{e}}ric Lafitte and
                  Olivier Markowitch},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Note on a Signature Building Block and Relevant Security Reduction
                  in the Green-Hohenberger {OT} Scheme},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {282--288},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_18},
  doi          = {10.1007/978-3-319-12087-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CaoLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CarletTTL13,
  author       = {Claude Carlet and
                  Deng Tang and
                  Xiaohu Tang and
                  Qunying Liao},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {New Construction of Differentially 4-Uniform Bijections},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {22--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_2},
  doi          = {10.1007/978-3-319-12087-4\_2},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CarletTTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenLYS13,
  author       = {Kai Chen and
                  Dongdai Lin and
                  Li Yan and
                  Xin Sun},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Environment-Bound {SAML} Assertions: {A} Fresh Approach to Enhance
                  the Security of {SAML} Assertions},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_23},
  doi          = {10.1007/978-3-319-12087-4\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenLYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenWLW13,
  author       = {Shan Chen and
                  Kunpeng Wang and
                  Dongdai Lin and
                  Tao Wang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Omega Pairing on Hyperelliptic Curves},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_11},
  doi          = {10.1007/978-3-319-12087-4\_11},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenWLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChiuHCDYC13,
  author       = {Yi{-}Hao Chiu and
                  Wei{-}Chih Hong and
                  Li{-}Ping Chou and
                  Jintai Ding and
                  Bo{-}Yin Yang and
                  Chen{-}Mou Cheng},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Practical Attack on Patched {MIFARE} Classic},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_10},
  doi          = {10.1007/978-3-319-12087-4\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChiuHCDYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DurnogaDKZ13,
  author       = {Konrad Durnoga and
                  Stefan Dziembowski and
                  Tomasz Kazana and
                  Michal Zajac},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {One-Time Programs with Limited Memory},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {377--394},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_24},
  doi          = {10.1007/978-3-319-12087-4\_24},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/DurnogaDKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GongZFY13,
  author       = {Xinxin Gong and
                  Bin Zhang and
                  Dengguo Feng and
                  Tongjiang Yan},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Autocorrelation Values of New Generalized Cyclotomic Sequences of
                  Order Six Over Z{\_}pq},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {86--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_6},
  doi          = {10.1007/978-3-319-12087-4\_6},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/GongZFY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HajraM13,
  author       = {Suvadeep Hajra and
                  Debdeep Mukhopadhyay},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Multivariate Leakage Model for Improving Non-profiling {DPA} on Noisy
                  Power Traces},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {325--342},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_21},
  doi          = {10.1007/978-3-319-12087-4\_21},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HajraM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuX13,
  author       = {Zhi Hu and
                  Maozhi Xu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {The Gallant-Lambert-Vanstone Decomposition Revisited},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_13},
  doi          = {10.1007/978-3-319-12087-4\_13},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiaLLL13,
  author       = {Dingding Jia and
                  Bao Li and
                  Xianhui Lu and
                  Yamin Liu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {{RSA-OAEP} is {RKA} Secure},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {270--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_17},
  doi          = {10.1007/978-3-319-12087-4\_17},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/JiaLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KubiakK13,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Supervised Usage of Signature Creation Devices},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_9},
  doi          = {10.1007/978-3-319-12087-4\_9},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KubiakK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiWLS13,
  author       = {Xiaoqian Li and
                  Peng Wang and
                  Bao Li and
                  Zhelei Sun},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cryptanalysis of Three Authenticated Encryption Schemes for Wireless
                  Sensor Networks},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {395--406},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_25},
  doi          = {10.1007/978-3-319-12087-4\_25},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiWLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiWZ13,
  author       = {Liangze Li and
                  Hongfeng Wu and
                  Fan Zhang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Pairing Computation on Edwards Curves with High-Degree Twists},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {185--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_12},
  doi          = {10.1007/978-3-319-12087-4\_12},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiangDWL13,
  author       = {Hongliang Liang and
                  Yu Dong and
                  Bin Wang and
                  Shuchang Liu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {EAdroid: Providing Environment Adaptive Security for Android System},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {118--131},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_8},
  doi          = {10.1007/978-3-319-12087-4\_8},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiangDWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuCL13,
  author       = {Mingjie Liu and
                  Jiazhe Chen and
                  Hexin Li},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Partially Known Nonces and Fault Injection Attacks on {SM2} Signature
                  Algorithm},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {343--358},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_22},
  doi          = {10.1007/978-3-319-12087-4\_22},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuGW13,
  author       = {Zhe Liu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Duncan S. Wong},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit
                  {AVR} Processors},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_14},
  doi          = {10.1007/978-3-319-12087-4\_14},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuSWZZ13,
  author       = {Shengli Liu and
                  Kouichi Sakurai and
                  Jian Weng and
                  Fangguo Zhang and
                  Yunlei Zhao},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security Model and Analysis of FHMQV, Revisited},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_16},
  doi          = {10.1007/978-3-319-12087-4\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SunHSXW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Ling Song and
                  Yonghong Xie and
                  Peng Wang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automatic Security Evaluation of Block Ciphers with S-bP Structures
                  Against Related-Key Differential Attacks},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_3},
  doi          = {10.1007/978-3-319-12087-4\_3},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TangLQXG13,
  author       = {Chunming Tang and
                  Yu Lou and
                  Yanfeng Qi and
                  Maozhi Xu and
                  Baoan Guo},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Note on Semi-bent and Hyper-bent Boolean Functions},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_1},
  doi          = {10.1007/978-3-319-12087-4\_1},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TangLQXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuWZZD13,
  author       = {Wenling Wu and
                  Shuang Wu and
                  Lei Zhang and
                  Jian Zou and
                  Le Dong},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LHash: {A} Lightweight Hash Function},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_19},
  doi          = {10.1007/978-3-319-12087-4\_19},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Xu13,
  author       = {Yunqing Xu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {On the Key-Stream Periods Probability of Edon80},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_4},
  doi          = {10.1007/978-3-319-12087-4\_4},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Xu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangWDQCS13,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Josep Domingo{-}Ferrer and
                  Bo Qin and
                  Sherman S. M. Chow and
                  Wenchang Shi},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric
                  Group Key Agreement},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_15},
  doi          = {10.1007/978-3-319-12087-4\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangWDQCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhaoGLZ13,
  author       = {Ruoxu Zhao and
                  Dawu Gu and
                  Juanru Li and
                  Yuanyuan Zhang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automatic Detection and Analysis of Encrypted Messages in Malware},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {101--117},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_7},
  doi          = {10.1007/978-3-319-12087-4\_7},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhaoGLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouLZ13,
  author       = {Jianqin Zhou and
                  Wanquan Liu and
                  Guanglu Zhou},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cube Theory and Stable k -Error Linear Complexity for Periodic Sequences},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_5},
  doi          = {10.1007/978-3-319-12087-4\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhouLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZouWW13,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cryptanalysis of the Round-Reduced {GOST} Hash Function},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {309--322},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_20},
  doi          = {10.1007/978-3-319-12087-4\_20},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZouWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}