Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2012.bht:"
@proceedings{DBLP:conf/cisc/2012, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38519-3}, doi = {10.1007/978-3-642-38519-3}, isbn = {978-3-642-38518-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AliM12, author = {Subidh Ali and Debdeep Mukhopadhyay}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Differential Fault Analysis of Twofish}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {10--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_2}, doi = {10.1007/978-3-642-38519-3\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/AliM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AokiY12, author = {Kazumaro Aoki and Kan Yasuda}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {The Security and Performance of "GCM" when Short Multiplications Are Used Instead}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {225--245}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_15}, doi = {10.1007/978-3-642-38519-3\_15}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AokiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BartlettASDW12, author = {Harry Bartlett and Mufeed Juma AlMashrafi and Leonie Simpson and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {A General Model for {MAC} Generation Using Direct Injection}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {198--215}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_13}, doi = {10.1007/978-3-642-38519-3\_13}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/BartlettASDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BayBMSV12, author = {Asl{\'{\i}} Bay and Ioana Boureanu and Aikaterini Mitrokotsa and Iosif Spulber and Serge Vaudenay}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {371--391}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_23}, doi = {10.1007/978-3-642-38519-3\_23}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BayBMSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenD12, author = {Yuan Chen and Qingkuan Dong}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {{RCCA} Security for {KEM+DEM} Style Hybrid Encryptions}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {102--121}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_8}, doi = {10.1007/978-3-642-38519-3\_8}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DingRT12, author = {Jintai Ding and Ai Ren and Chengdong Tao}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {122--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_9}, doi = {10.1007/978-3-642-38519-3\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DingRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DolevFL12, author = {Shlomi Dolev and Nova Fandina and Ximing Li}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Nested Merkle's Puzzles against Sampling Attacks}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {157--174}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_11}, doi = {10.1007/978-3-642-38519-3\_11}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DolevFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuoLW12, author = {Teng Guo and Feng Liu and Chuan Kun Wu}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Visual Cryptography for Natural Images and Visual Voting}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {90--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_7}, doi = {10.1007/978-3-642-38519-3\_7}, timestamp = {Tue, 22 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GuoLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HakalaKN12, author = {Risto M. Hakala and Atle Kivel{\"{a}} and Kaisa Nyberg}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Estimating Resistance against Multidimensional Linear Attacks: An Application on {DEAN}}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {246--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_16}, doi = {10.1007/978-3-642-38519-3\_16}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HakalaKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HanWL12, author = {Lidong Han and Wei Wei and Mingjie Liu}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {On the Multiple Fault Attacks on {RSA} Signatures with LSBs of Messages Unknown}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {1--9}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_1}, doi = {10.1007/978-3-642-38519-3\_1}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HanWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiaoWZL12, author = {Lin Jiao and Mingsheng Wang and Bin Zhang and Yongqiang Li}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {294--310}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_19}, doi = {10.1007/978-3-642-38519-3\_19}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JiaoWZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KhalfaouiMG12, author = {Mehdi Khalfaoui and Refik Molva and Laurent Gomez}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Secure Product Tracking in Supply Chain}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {351--370}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_22}, doi = {10.1007/978-3-642-38519-3\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/KhalfaouiMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {46--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_4}, doi = {10.1007/978-3-642-38519-3\_4}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MengWSK12, author = {Yuxin Meng and Duncan S. Wong and Roman Schlegel and Lam{-}for Kwok}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {331--350}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_21}, doi = {10.1007/978-3-642-38519-3\_21}, timestamp = {Fri, 12 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/MengWSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MohamadP12, author = {Moesfa Soeheila Mohamad and Geong Sen Poh}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Verifiable Structured Encryption}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {137--156}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_10}, doi = {10.1007/978-3-642-38519-3\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MohamadP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NguyenRMW12, author = {Phuong Ha Nguyen and Chester Rebeiro and Debdeep Mukhopadhyay and Huaxiong Wang}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Improved Differential Cache Attacks on {SMS4}}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {29--45}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_3}, doi = {10.1007/978-3-642-38519-3\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/NguyenRMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ShiAL12, author = {Tao Shi and Vladimir Anashin and Dongdai Lin}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Fast Evaluation of T-Functions via Time-Memory Trade-Offs}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {263--275}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_17}, doi = {10.1007/978-3-642-38519-3\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ShiAL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SunWZ12, author = {Zhelei Sun and Peng Wang and Liting Zhang}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Collision Attacks on Variant of {OCB} Mode and Its Series}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {216--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_14}, doi = {10.1007/978-3-642-38519-3\_14}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/SunWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WalterBB12, author = {Michael Walter and Stanislav Bulygin and Johannes Buchmann}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to {EPCBC}}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {175--197}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_12}, doi = {10.1007/978-3-642-38519-3\_12}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WalterBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangH12, author = {Lin Wang and Zhi Hu}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {New Sequences of Period p n and p n + 1 via Projective Linear Groups}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {311--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_20}, doi = {10.1007/978-3-642-38519-3\_20}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLL12, author = {Tianze Wang and Meicheng Liu and Dongdai Lin}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {276--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_18}, doi = {10.1007/978-3-642-38519-3\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YaoLZZ12, author = {Jintao Yao and Kangshun Li and Mingwu Zhang and Min Zhou}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {A Robust Fuzzy Extractor without ECCs}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {60--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_5}, doi = {10.1007/978-3-642-38519-3\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YaoLZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YuZ12, author = {Yang Yu and Zhanfei Zhou}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {69--89}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_6}, doi = {10.1007/978-3-642-38519-3\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.