Search dblp for Publications

export results for "toc:db/conf/cisc/inscrypt2012.bht:"

 download as .bib file

@proceedings{DBLP:conf/cisc/2012,
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38519-3},
  doi          = {10.1007/978-3-642-38519-3},
  isbn         = {978-3-642-38518-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AliM12,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Differential Fault Analysis of Twofish},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {10--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_2},
  doi          = {10.1007/978-3-642-38519-3\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/AliM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AokiY12,
  author       = {Kazumaro Aoki and
                  Kan Yasuda},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {The Security and Performance of "GCM" when Short Multiplications Are
                  Used Instead},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {225--245},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_15},
  doi          = {10.1007/978-3-642-38519-3\_15},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/AokiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BartlettASDW12,
  author       = {Harry Bartlett and
                  Mufeed Juma AlMashrafi and
                  Leonie Simpson and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {A General Model for {MAC} Generation Using Direct Injection},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_13},
  doi          = {10.1007/978-3-642-38519-3\_13},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/BartlettASDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BayBMSV12,
  author       = {Asl{\'{\i}} Bay and
                  Ioana Boureanu and
                  Aikaterini Mitrokotsa and
                  Iosif Spulber and
                  Serge Vaudenay},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {371--391},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_23},
  doi          = {10.1007/978-3-642-38519-3\_23},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BayBMSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenD12,
  author       = {Yuan Chen and
                  Qingkuan Dong},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {{RCCA} Security for {KEM+DEM} Style Hybrid Encryptions},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {102--121},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_8},
  doi          = {10.1007/978-3-642-38519-3\_8},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DingRT12,
  author       = {Jintai Ding and
                  Ai Ren and
                  Chengdong Tao},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Embedded Surface Attack on Multivariate Public Key Cryptosystems from
                  Diophantine Equations},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_9},
  doi          = {10.1007/978-3-642-38519-3\_9},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/DingRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DolevFL12,
  author       = {Shlomi Dolev and
                  Nova Fandina and
                  Ximing Li},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Nested Merkle's Puzzles against Sampling Attacks},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_11},
  doi          = {10.1007/978-3-642-38519-3\_11},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/DolevFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GuoLW12,
  author       = {Teng Guo and
                  Feng Liu and
                  Chuan Kun Wu},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Visual Cryptography for Natural Images and Visual Voting},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {90--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_7},
  doi          = {10.1007/978-3-642-38519-3\_7},
  timestamp    = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/GuoLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HakalaKN12,
  author       = {Risto M. Hakala and
                  Atle Kivel{\"{a}} and
                  Kaisa Nyberg},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Estimating Resistance against Multidimensional Linear Attacks: An
                  Application on {DEAN}},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {246--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_16},
  doi          = {10.1007/978-3-642-38519-3\_16},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HakalaKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HanWL12,
  author       = {Lidong Han and
                  Wei Wei and
                  Mingjie Liu},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {On the Multiple Fault Attacks on {RSA} Signatures with LSBs of Messages
                  Unknown},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_1},
  doi          = {10.1007/978-3-642-38519-3\_1},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HanWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiaoWZL12,
  author       = {Lin Jiao and
                  Mingsheng Wang and
                  Bin Zhang and
                  Yongqiang Li},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {An Improved Time-Memory-Data Trade-Off Attack against Irregularly
                  Clocked and Filtered Keystream Generators},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_19},
  doi          = {10.1007/978-3-642-38519-3\_19},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/JiaoWZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KhalfaouiMG12,
  author       = {Mehdi Khalfaoui and
                  Refik Molva and
                  Laurent Gomez},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Secure Product Tracking in Supply Chain},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {351--370},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_22},
  doi          = {10.1007/978-3-642-38519-3\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/KhalfaouiMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_4},
  doi          = {10.1007/978-3-642-38519-3\_4},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MengWSK12,
  author       = {Yuxin Meng and
                  Duncan S. Wong and
                  Roman Schlegel and
                  Lam{-}for Kwok},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Touch Gestures Based Biometric Authentication Scheme for Touchscreen
                  Mobile Phones},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {331--350},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_21},
  doi          = {10.1007/978-3-642-38519-3\_21},
  timestamp    = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/MengWSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MohamadP12,
  author       = {Moesfa Soeheila Mohamad and
                  Geong Sen Poh},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Verifiable Structured Encryption},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {137--156},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_10},
  doi          = {10.1007/978-3-642-38519-3\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MohamadP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NguyenRMW12,
  author       = {Phuong Ha Nguyen and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  Huaxiong Wang},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Improved Differential Cache Attacks on {SMS4}},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_3},
  doi          = {10.1007/978-3-642-38519-3\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/NguyenRMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ShiAL12,
  author       = {Tao Shi and
                  Vladimir Anashin and
                  Dongdai Lin},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Fast Evaluation of T-Functions via Time-Memory Trade-Offs},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {263--275},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_17},
  doi          = {10.1007/978-3-642-38519-3\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ShiAL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SunWZ12,
  author       = {Zhelei Sun and
                  Peng Wang and
                  Liting Zhang},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Collision Attacks on Variant of {OCB} Mode and Its Series},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {216--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_14},
  doi          = {10.1007/978-3-642-38519-3\_14},
  timestamp    = {Tue, 17 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/SunWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WalterBB12,
  author       = {Michael Walter and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications
                  to {EPCBC}},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {175--197},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_12},
  doi          = {10.1007/978-3-642-38519-3\_12},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WalterBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangH12,
  author       = {Lin Wang and
                  Zhi Hu},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {New Sequences of Period p n and p n + 1 via Projective Linear Groups},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {311--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_20},
  doi          = {10.1007/978-3-642-38519-3\_20},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLL12,
  author       = {Tianze Wang and
                  Meicheng Liu and
                  Dongdai Lin},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Construction of Resilient and Nonlinear Boolean Functions with Almost
                  Perfect Immunity to Algebraic and Fast Algebraic Attacks},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {276--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_18},
  doi          = {10.1007/978-3-642-38519-3\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YaoLZZ12,
  author       = {Jintao Yao and
                  Kangshun Li and
                  Mingwu Zhang and
                  Min Zhou},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {A Robust Fuzzy Extractor without ECCs},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_5},
  doi          = {10.1007/978-3-642-38519-3\_5},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YaoLZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YuZ12,
  author       = {Yang Yu and
                  Zhanfei Zhou},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {An Efficient Rational Secret Sharing Protocol Resisting against Malicious
                  Adversaries over Synchronous Channels},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {69--89},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_6},
  doi          = {10.1007/978-3-642-38519-3\_6},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics