


default search action
Inscrypt 2007: Xining, China
- Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu:

Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4990, Springer 2008, ISBN 978-3-540-79498-1
Invited Talks
- Vivien Dubois, Pierre-Alain Fouque

, Adi Shamir, Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme. 1-4 - Moti Yung:

On the Evolution of User Authentication: Non-bilateral Factors. 5-10
Digital Signature Schemes
- Raylin Tso

, Takeshi Okamoto, Eiji Okamoto:
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. 11-24 - Wei Wu, Yi Mu, Willy Susilo

, Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. 25-39 - Chunxiang Gu, Yuefei Zhu:

An Efficient ID-Based Proxy Signature Scheme from Pairings. 40-50
Block Cipher
- Baudoin Collard, François-Xavier Standaert

, Jean-Jacques Quisquater:
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. 51-65 - Andrey Bogdanov:

Linear Slide Attacks on the KeeLoq Block Cipher. 66-80
Key Management
- Jun-Wu Dong, Dingyi Pei, Xueli Wang:

A Key Predistribution Scheme Based on 3-Designs. 81-92 - Weijia Wang, Lei Hu, Yong Li:

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. 93-107 - Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis

, George Stephanides, Anastasios Alexiadis:
A Provably Secure One-Pass Two-Party Key Establishment Protocol. 108-122
Zero Knowledge and Secure Computation Protocols
- Yi Deng, Dongdai Lin:

Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. 123-137 - Marc Mouffron, Frederic Rousseau, Huafei Zhu:

Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. 138-152 - Ning Ding, Dawu Gu:

A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. 153-166
Secret Sharing
- Christophe Tartary, Josef Pieprzyk

, Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. 167-181 - Chuangui Ma, Rui Cheng:

Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. 182-191 - Daoshun Wang, Xiaobo Li, Feng Yi:

Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. 192-200
Stream Cipher and Pseudorandomness
- Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert:

Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. 201-215 - Jin-Song Wang, Wen-Feng Qi:

Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. 216-230 - Zhixiong Chen, Ning Zhang, Guozhen Xiao:

Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. 231-245 - Nicholas Kolokotronis

, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. 246-255
Boolean Functions
- Jin-Song Wang, Wen-Feng Qi:

Linear Equation on Polynomial Single Cycle T-Functions. 256-270 - Longjiang Qu, Chao Li:

Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. 271-282
Privacy and Deniability
- Jacek Cichon

, Miroslaw Kutylowski:
Anonymity and k-Choice Identities. 283-297 - Shaoquan Jiang:

Deniable Authentication on the Internet. 298-312 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:

Orthogonality between Key Privacy and Data Privacy, Revisited. 313-327 - Sujing Zhou, Dongdai Lin:

Unlinkable Randomizable Signature and Its Application in Group Signature. 328-342
Hash Functions
- Shiwei Chen, Chenhui Jin:

An Improved Collision Attack on MD5 Algorithm. 343-357 - Jintai Ding

, Bo-Yin Yang:
Multivariates Polynomials for Hashing. 358-371
Public Key Cryptosystems
- Chunxiang Gu, Yuefei Zhu, Heng Pan:

Efficient Public Key Encryption with Keyword Search Schemes from Pairings. 372-383 - Fuchun Guo

, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. 384-398
Public Key Analysis
- Xin Jiang, Jintai Ding

, Lei Hu:
Kipnis-Shamir Attack on HFE Revisited. 399-411 - Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai:

Cryptanalysis of General Lu-Lee Type Systems. 412-426 - Adam L. Young, Moti Yung:

A Timing-Resistant Elliptic Curve Backdoor in RSA. 427-441
Application Security
- Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang

, Zan Li, Kai Fan:
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. 442-456 - Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:

Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. 457-462
Systems Security and Trusted Computing
- Jing Zhan, Huanguo Zhang, Fei Yan:

Building Trusted Sub-domain for the Grid with Trusted Computing. 463-471 - Yongdong Wu, Feng Bao, Robert H. Deng

, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. 472-481 - Yang Xiang, Qiang Li

:
Online Tracing Scanning Worm with Sliding Window. 482-496
Network Security
- Junfeng Tian, Ning Li:

A New Proactive Defense Model Based on Intrusion Deception and Traceback. 497-506 - Fouz Sattar, Muid Mufti:

On Modeling Post Decryption Error Processes in UMTS Air Interface. 507-516 - Feng Cheng, Christian Wolter, Christoph Meinel:

A Simple, Smart and Extensible Framework for Network Security Measurement. 517-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














