


default search action
ISPEC 2012: Hangzhou, China
- Mark Dermot Ryan

, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5
Digital Signatures
- Fuchun Guo

, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
A Pre-computable Signature Scheme with Efficient Verification for RFID. 1-16 - Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:

Redactable Signatures for Independent Removal of Structure and Content. 17-33
Public Key Cryptography
- Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:

Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. 34-45 - Chong-zhi Gao, Dongqing Xie, Baodian Wei:

Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. 46-62 - Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto

, Hideki Sakurada:
Computational Soundness of Indistinguishability Properties without Computable Parsing. 63-79
Cryptanalysis I: Differential Attacks
- Dongxia Bai, Leibo Li:

New Impossible Differential Attacks on Camellia. 80-96 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:

Impossible Differential Attacks on Reduced-Round LBlock. 97-108 - Takuma Koyama

, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. 109-125
Applications I.i: Oblivious Transfer
- Christian L. F. Corniaux

, Hossein Ghodosi:
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings. 126-143 - K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:

A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. 144-157
Applications I.ii: Internet Security (Works-in-Progress)
- Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang:

Towards Fine-Grained Access Control on Browser Extensions. 158-169 - Yang-Wai Chow

, Willy Susilo
:
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. 170-181
Key Management
- Nathaniel Wesley Filardo, Giuseppe Ateniese:

High-Entropy Visual Identification for Touch Screen Devices. 182-198 - Chuah Chai Wen

, Ed Dawson
, Juan Manuel González Nieto, Leonie Simpson
:
A Framework for Security Analysis of Key Derivation Functions. 199-216
Applied Cryptography
- Teng Guo, Feng Liu, Chuan Kun Wu:

On the Equivalence of Two Definitions of Visual Cryptography Scheme. 217-227 - Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi

, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. 228-244 - Kazuya Izawa, Atsuko Miyaji

, Kazumasa Omote:
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. 245-258
Applications II.i: PINs
- Johannes Braun, Moritz Horsch, Alexander Wiesmaier

:
iPIN and mTAN for Secure eID Applications. 259-276
Applications II.ii: Fundamentals (Works-in-Progress)
- Manuel Liedel:

Secure Distributed Computation of the Square Root and Applications. 277-288 - Shuo Tian, Yeping He, Baozeng Ding:

Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. 289-300
Cryptanalysis II: Fault Attacks and Key Recovery
- Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert:

Structure-Based RSA Fault Attacks. 301-318 - Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo

, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. 319-336 - Yanfeng Wang, Wenling Wu, Xiaoli Yu:

Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. 337-352 - Zhenfei Zhang, Thomas Plantard

, Willy Susilo
:
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. 353-368
Cryptanalysis III: Key Recovery (Works-in-Progress)
- Marc Joye, Tancrède Lepoint

:
Partial Key Exposure on RSA with Private Exponents Larger Than N. 369-380 - Yue Sun, Meiqin Wang:

Linear Cryptanalysis of Reduced-Round ICEBERG. 381-392 - An Wang, Man Chen, Zongyue Wang, Yaoling Ding:

Overcoming Significant Noise: Correlation-Template-Induction Attack. 393-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














