:facetid:toc:\"db/conf/cisc/inscrypt2013.bht\"OK:facetid:toc:db/conf/cisc/inscrypt2013.bhtDongdai LinShouhuai XuMoti YungInformation Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected PapersInscryptLecture Notes in Computer Science8567Springer2014Editorshipconf/cisc/201310.1007/978-3-319-12087-4https://doi.org/10.1007/978-3-319-12087-4https://dblp.org/rec/conf/cisc/2013URL#3938825Zhengjun CaoFrédéric LafitteOlivier MarkowitchA Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme.Inscrypt282-2882013Conference and Workshop Papersclosedconf/cisc/CaoLM1310.1007/978-3-319-12087-4_18https://doi.org/10.1007/978-3-319-12087-4_18https://dblp.org/rec/conf/cisc/CaoLM13URL#4093762Claude CarletDeng TangXiaohu TangQunying LiaoNew Construction of Differentially 4-Uniform Bijections.Inscrypt22-382013Conference and Workshop Papersclosedconf/cisc/CarletTTL1310.1007/978-3-319-12087-4_2https://doi.org/10.1007/978-3-319-12087-4_2https://dblp.org/rec/conf/cisc/CarletTTL13URL#4093763Kai ChenDongdai LinLi YanXin SunEnvironment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions.Inscrypt361-3762013Conference and Workshop Papersclosedconf/cisc/ChenLYS1310.1007/978-3-319-12087-4_23https://doi.org/10.1007/978-3-319-12087-4_23https://dblp.org/rec/conf/cisc/ChenLYS13URL#4093764Shan ChenKunpeng WangDongdai LinTao WangOmega Pairing on Hyperelliptic Curves.Inscrypt167-1842013Conference and Workshop Papersclosedconf/cisc/ChenWLW1310.1007/978-3-319-12087-4_11https://doi.org/10.1007/978-3-319-12087-4_11https://dblp.org/rec/conf/cisc/ChenWLW13URL#4093765Yi-Hao ChiuWei-Chih HongLi-Ping ChouJintai DingBo-Yin YangChen-Mou ChengA Practical Attack on Patched MIFARE Classic.Inscrypt150-1642013Conference and Workshop Papersclosedconf/cisc/ChiuHCDYC1310.1007/978-3-319-12087-4_10https://doi.org/10.1007/978-3-319-12087-4_10https://dblp.org/rec/conf/cisc/ChiuHCDYC13URL#4093766Konrad DurnogaStefan DziembowskiTomasz KazanaMichal Zajac 0001One-Time Programs with Limited Memory.Inscrypt377-3942013Conference and Workshop Papersclosedconf/cisc/DurnogaDKZ1310.1007/978-3-319-12087-4_24https://doi.org/10.1007/978-3-319-12087-4_24https://dblp.org/rec/conf/cisc/DurnogaDKZ13URL#4093767Xinxin GongBin Zhang 0003Dengguo FengTongjiang YanAutocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.Inscrypt86-982013Conference and Workshop Papersclosedconf/cisc/GongZFY1310.1007/978-3-319-12087-4_6https://doi.org/10.1007/978-3-319-12087-4_6https://dblp.org/rec/conf/cisc/GongZFY13URL#4093768Suvadeep HajraDebdeep MukhopadhyayMultivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces.Inscrypt325-3422013Conference and Workshop Papersclosedconf/cisc/HajraM1310.1007/978-3-319-12087-4_21https://doi.org/10.1007/978-3-319-12087-4_21https://dblp.org/rec/conf/cisc/HajraM13URL#4093769Zhi HuMaozhi XuThe Gallant-Lambert-Vanstone Decomposition Revisited.Inscrypt201-2162013Conference and Workshop Papersclosedconf/cisc/HuX1310.1007/978-3-319-12087-4_13https://doi.org/10.1007/978-3-319-12087-4_13https://dblp.org/rec/conf/cisc/HuX13URL#4093770Dingding JiaBao Li 0001Xianhui LuYamin LiuRSA-OAEP is RKA Secure.Inscrypt270-2812013Conference and Workshop Papersclosedconf/cisc/JiaLLL1310.1007/978-3-319-12087-4_17https://doi.org/10.1007/978-3-319-12087-4_17https://dblp.org/rec/conf/cisc/JiaLLL13URL#4093771Przemyslaw Kubiak 0001Miroslaw KutylowskiSupervised Usage of Signature Creation Devices.Inscrypt132-1492013Conference and Workshop Papersclosedconf/cisc/KubiakK1310.1007/978-3-319-12087-4_9https://doi.org/10.1007/978-3-319-12087-4_9https://dblp.org/rec/conf/cisc/KubiakK13URL#4093772Xiaoqian LiPeng Wang 0009Bao Li 0001Zhelei SunCryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks.Inscrypt395-4062013Conference and Workshop Papersclosedconf/cisc/LiWLS1310.1007/978-3-319-12087-4_25https://doi.org/10.1007/978-3-319-12087-4_25https://dblp.org/rec/conf/cisc/LiWLS13URL#4093773Liangze LiHongfeng WuFan ZhangPairing Computation on Edwards Curves with High-Degree Twists.Inscrypt185-2002013Conference and Workshop Papersclosedconf/cisc/LiWZ1310.1007/978-3-319-12087-4_12https://doi.org/10.1007/978-3-319-12087-4_12https://dblp.org/rec/conf/cisc/LiWZ13URL#4093774Hongliang LiangYu DongBin WangShuchang Liu 0005EAdroid: Providing Environment Adaptive Security for Android System.Inscrypt118-1312013Conference and Workshop Papersclosedconf/cisc/LiangDWL1310.1007/978-3-319-12087-4_8https://doi.org/10.1007/978-3-319-12087-4_8https://dblp.org/rec/conf/cisc/LiangDWL13URL#4093775Mingjie LiuJiazhe ChenHexin LiPartially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm.Inscrypt343-3582013Conference and Workshop Papersclosedconf/cisc/LiuCL1310.1007/978-3-319-12087-4_22https://doi.org/10.1007/978-3-319-12087-4_22https://dblp.org/rec/conf/cisc/LiuCL13URL#4093776Zhe Liu 0001Johann GroßschädlDuncan S. WongLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors.Inscrypt217-2352013Conference and Workshop Papersclosedconf/cisc/LiuGW1310.1007/978-3-319-12087-4_14https://doi.org/10.1007/978-3-319-12087-4_14https://dblp.org/rec/conf/cisc/LiuGW13URL#4093777Shengli Liu 0001Kouichi SakuraiJian Weng 0001Fangguo ZhangYunlei ZhaoSecurity Model and Analysis of FHMQV, Revisited.Inscrypt255-2692013Conference and Workshop Papersclosedconf/cisc/LiuSWZZ1310.1007/978-3-319-12087-4_16https://doi.org/10.1007/978-3-319-12087-4_16https://dblp.org/rec/conf/cisc/LiuSWZZ13URL#4093778Siwei SunLei HuLing Song 0001Yonghong XiePeng Wang 0009Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.Inscrypt39-512013Conference and Workshop Papersclosedconf/cisc/SunHSXW1310.1007/978-3-319-12087-4_3https://doi.org/10.1007/978-3-319-12087-4_3https://dblp.org/rec/conf/cisc/SunHSXW13URL#4093779Chunming Tang 0001Yu LouYanfeng QiMaozhi XuBaoan GuoA Note on Semi-bent and Hyper-bent Boolean Functions.Inscrypt3-212013Conference and Workshop Papersclosedconf/cisc/TangLQXG1310.1007/978-3-319-12087-4_1https://doi.org/10.1007/978-3-319-12087-4_1https://dblp.org/rec/conf/cisc/TangLQXG13URL#4093780Wenling WuShuang Wu 0004Lei Zhang 0012Jian ZouLe DongLHash: A Lightweight Hash Function.Inscrypt291-3082013Conference and Workshop Papersclosedconf/cisc/WuWZZD1310.1007/978-3-319-12087-4_19https://doi.org/10.1007/978-3-319-12087-4_19https://dblp.org/rec/conf/cisc/WuWZZD13URL#4093781Yunqing XuOn the Key-Stream Periods Probability of Edon80.Inscrypt55-692013Conference and Workshop Papersclosedconf/cisc/Xu1310.1007/978-3-319-12087-4_4https://doi.org/10.1007/978-3-319-12087-4_4https://dblp.org/rec/conf/cisc/Xu13URL#4093782Lei Zhang 0009Qianhong WuJosep Domingo-FerrerBo QinSherman S. M. ChowWenchang ShiSecure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.Inscrypt239-2542013Conference and Workshop Papersclosedconf/cisc/ZhangWDQCS1310.1007/978-3-319-12087-4_15https://doi.org/10.1007/978-3-319-12087-4_15https://dblp.org/rec/conf/cisc/ZhangWDQCS13URL#4093783Ruoxu ZhaoDawu GuJuanru LiYuanyuan Zhang 0002Automatic Detection and Analysis of Encrypted Messages in Malware.Inscrypt101-1172013Conference and Workshop Papersclosedconf/cisc/ZhaoGLZ1310.1007/978-3-319-12087-4_7https://doi.org/10.1007/978-3-319-12087-4_7https://dblp.org/rec/conf/cisc/ZhaoGLZ13URL#4093784Jianqin ZhouWanquan LiuGuanglu ZhouCube Theory and Stable k -Error Linear Complexity for Periodic Sequences.Inscrypt70-852013Conference and Workshop Papersclosedconf/cisc/ZhouLZ1310.1007/978-3-319-12087-4_5https://doi.org/10.1007/978-3-319-12087-4_5https://dblp.org/rec/conf/cisc/ZhouLZ13URL#4093785Jian ZouWenling WuShuang Wu 0004Cryptanalysis of the Round-Reduced GOST Hash Function.Inscrypt309-3222013Conference and Workshop Papersclosedconf/cisc/ZouWW1310.1007/978-3-319-12087-4_20https://doi.org/10.1007/978-3-319-12087-4_20https://dblp.org/rec/conf/cisc/ZouWW13URL#4093786