


default search action
Inscrypt 2009: Beijing, China
- Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:

Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8
Cryptanalysis
- Ping Li, Bing Sun, Chao Li:

Integral Cryptanalysis of ARIA. 1-14 - Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel

:
Cryptanalysis of the ESSENCE Family of Hash Functions. 15-34 - Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li:

Differential-Multiple Linear Cryptanalysis. 35-49 - Jiqiang Lu:

Differential Attack on Five Rounds of the SC2000 Block Cipher. 50-59
Signature and Signcryption
- Wei Zhao, Dingfeng Ye:

Pairing-Based Nominative Signatures with Selective and Universal Convertibility. 60-74 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. 75-92 - Shivank Agrawal, Swarun Kumar

, Amjed Shareef, C. Pandu Rangan:
Sanitizable Signatures with Strong Transparency in the Standard Model. 93-107 - S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan:

Breaking and Building of Threshold Signcryption Schemes. 108-123
Key Exchange
- Fengjiao Wang, Yuqing Zhang:

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption. 124-133 - Zhigang Gao, Dengguo Feng:

An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network. 134-143 - Xuexian Hu

, Wenfen Liu:
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. 144-153
Private Computations
- Helger Lipmaa

, Bingsheng Zhang:
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. 154-163 - Yanjiang Yang, Jian Weng

, Jianying Zhou
, Ying Qiu:
Optionally Identifiable Private Handshakes. 164-178 - Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience. 179-197
Cipher Design and Analysis
- Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang:

Gemstone: A New Stream Cipher Using Coupled Map Lattice. 198-214 - Lei Zhang, Wenling Wu, Liting Zhang:

Proposition of Two Cipher Structures. 215-229 - Deian Stefan:

Hardware Framework for the Rabbit Stream Cipher. 230-247 - Muhammad Reza Z'aba, Leonie Simpson

, Ed Dawson
, Kenneth Koon-Ho Wong
:
Linearity within the SMS4 Block Cipher. 248-265 - Jean-Charles Faugère, Ludovic Perret:

Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages. 266-277
Public Key Cryptography
- Xianmeng Meng, Jingguo Bi:

Weak Keys in RSA with Primes Sharing Least Significant Bits. 278-287 - Takeo Mizuno, Hiroshi Doi:

Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption. 288-302 - Rui Zhang, Hideki Imai:

Constructing Better KEMs with Partial Message Recovery. 303-312
Network and System Security
- Xiaofeng Nie, Jiwu Jing, Yuewu Wang:

A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. 313-323 - Feng Cheng, Sebastian Roschke, Robert Schuppenies, Christoph Meinel:

Remodeling Vulnerability Information. 324-336 - Elie Bursztein, John C. Mitchell:

Using Strategy Objectives for Network Security Analysis. 337-349
Hardware Security
- Liqun Chen

:
A DAA Scheme Requiring Less TPM Resources. 350-365 - Johann Großschädl:

Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags. 366-382 - Pedro Peris-Lopez

, Julio C. Hernandez-Castro
, Juan E. Tapiador
, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. 383-392 - Mathieu Renauld, François-Xavier Standaert

:
Algebraic Side-Channel Attacks. 393-410
Web Security
- Le Kang, Ji Xiang:

CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing. 411-425 - Saba Jalal, Brian King:

An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents. 426-442 - Sean Policarpio, Yan Zhang:

A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints. 443-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














