default search action
Inscrypt 2008: Beijing, China
- Moti Yung, Peng Liu, Dongdai Lin:
Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5487, Springer 2009, ISBN 978-3-642-01439-0
Invited Talks
- Bart Preneel:
The State of Hash Functions and the NIST SHA-3 Competition. 1-11 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. 12-21 - Peng Liu:
Secure and Privacy-Preserving Information Brokering. 22
Digital Signature and Signcryption Schemes
- Wei Zhao, Changlu Lin, Dingfeng Ye:
Provably Secure Convertible Nominative Signature Scheme. 23-40 - Huaqun Wang, Hong Yu:
Cryptanalysis of Two Ring Signcryption Schemes. 41-46 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles. 47-59
Privacy and Anonymity
- Rui Zhang, Hideki Imai:
Strong Anonymous Signatures. 60-71 - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption. 72-83 - Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo:
Privacy for Private Key in Signatures. 84-95
Message Authentication Code and Hash Function
- Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. 96-114 - Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Security Analysis of Multivariate Polynomials for Hashing. 115-124
Secure Protocols
- Mengjun Li, Ti Zhou, Zhoujun Li:
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. 125-140 - Kun Peng, Feng Bao:
Batch ZK Proof and Verification of OR Logic. 141-156
Symmetric Cryptography
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. 157-180 - Wenying Zhang, Jing Han:
Impossible Differential Analysis of Reduced Round CLEFIA. 181-191 - Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan:
Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. 192-200
Certificateless Cryptography
- Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. 201-216 - Xu An Wang, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. 217-239
Hardware Implementation and Side Channel Attack
- Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. 240-252 - Duo Liu, Zhiyong Tan, Yiqi Dai:
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. 253-264
Wireless Network Security
- Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. 265-274 - Sushmita Ruj, Bimal K. Roy:
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. 275-288 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. 289-304
Public Key and Identity Based Cryptography
- Ningbo Mu, Yupu Hu, Leyou Zhang:
On the Computational Efficiency of XTR+. 305-313 - Mahabir Prasad Jhanwar, Rana Barua:
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. 314-331 - Qiang Tang, Pieter H. Hartel, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. 332-347
Access Control and Network Security
- Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. 348-369 - Lingli Deng, Yeping He, Ziyao Xu:
Separation of Duty in Trust-Based Collaboration. 370-388
Trusted Computing and Applications
- Ziyao Xu, Yeping He, Lingli Deng:
An Integrity Assurance Mechanism for Run-Time Programs. 389-405 - Tong-Lee Lim, Tieyan Li, Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols. 406-424 - Kun Peng, Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. 425-437
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.