default search action
Inscrypt 2012: Beijing, China
- Miroslaw Kutylowski, Moti Yung:
Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6 - Lidong Han, Wei Wei, Mingjie Liu:
On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown. 1-9 - Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of Twofish. 10-28 - Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. 29-45 - Yang Li, Kazuo Ohta, Kazuo Sakiyama:
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. 46-59 - Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou:
A Robust Fuzzy Extractor without ECCs. 60-68 - Yang Yu, Zhanfei Zhou:
An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels. 69-89 - Teng Guo, Feng Liu, Chuan Kun Wu:
Visual Cryptography for Natural Images and Visual Voting. 90-101 - Yuan Chen, Qingkuan Dong:
RCCA Security for KEM+DEM Style Hybrid Encryptions. 102-121 - Jintai Ding, Ai Ren, Chengdong Tao:
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. 122-136 - Moesfa Soeheila Mohamad, Geong Sen Poh:
Verifiable Structured Encryption. 137-156 - Shlomi Dolev, Nova Fandina, Ximing Li:
Nested Merkle's Puzzles against Sampling Attacks. 157-174 - Michael Walter, Stanislav Bulygin, Johannes Buchmann:
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC. 175-197 - Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. 198-215 - Zhelei Sun, Peng Wang, Liting Zhang:
Collision Attacks on Variant of OCB Mode and Its Series. 216-224 - Kazumaro Aoki, Kan Yasuda:
The Security and Performance of "GCM" when Short Multiplications Are Used Instead. 225-245 - Risto M. Hakala, Atle Kivelä, Kaisa Nyberg:
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN. 246-262 - Tao Shi, Vladimir Anashin, Dongdai Lin:
Fast Evaluation of T-Functions via Time-Memory Trade-Offs. 263-275 - Tianze Wang, Meicheng Liu, Dongdai Lin:
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. 276-293 - Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li:
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. 294-310 - Lin Wang, Zhi Hu:
New Sequences of Period p n and p n + 1 via Projective Linear Groups. 311-330 - Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok:
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. 331-350 - Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Product Tracking in Supply Chain. 351-370 - Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay:
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. 371-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.