会议文集


文集名Information Security and Cryptology
会议名20th International Conference on Information Security and Cryptology (Inscrypt 2024)
中译名《第二十届国际信息安全与密码学会议,卷1》
机构International Association for Cryptologic Research (IACR)
会议日期December 14-16, 2024
会议地点Kunming, China
出版年2025
馆藏号356947


题名作者出版年
Revocable Registered Attribute-Based Keyword Search Supporting FairnessZongmin Wang; Qiang Wang; Fucai Zhou; Jian Xu2025
HiddenStor: A Steganographic Storage System Built on Secret SharingSiyuan Ma; Yuewu Wang; Chunjing Kou; Peng Wang; Haotian Shi; Jiwu Jing2025
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable AnonymousChenchen Wu; Weijing You; Li Xu2025
On the Relationship Between Public Key Primitives via IndifferentiabilityShuang Hu; Bingsheng Zhang; Cong Zhang; Kui Ren2025
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and ConstructionsHongxiao Wang; Siu-Ming Yiu; Yanmin Zhao; Zoe L. Jiang; Min Xie2025
From Signature with Re-randomizable Keys: Generic Construction of PDPKSZiyi Li; Ruida Wang; Xianhui Lu; Yao Cheng; Liming Gao2025
SIMD Optimizations of White-Box Block Cipher Implementations with the Self-equivalence FrameworkLuoqi Chen; Yufeng Tang; Liangju Zhao; Zheng Gong2025
When Is Multi-channel Better Than Single-Channel: A Case Study of Product-Based Multi-channel Fusion AttacksShilong You; Jianfeng Du; Zhu Wang; Aimin Yu2025
Privacy-Preserving Certificate-Less Authenticated Key Exchange with Key Registration PrivacyLi Duan; Yong Li2025
An Improved Signal Leakage Attack Against DXL Key Exchange ProtocolZhiwei Li; Jun Xu; Lei Hu2025
srCPace: Universally Composable PAKE with Subversion-ResilienceJiahao Liu; Yi Wang; Rongmao Chen; Xincheng Tang; Jinshu Su2025
Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERTHaoyang Lu; Rui Zhang; Tong Kong2025
EditPSM: A New Password Strength Meter Based on Password Reuse via Deep LearningYifei Zhang; Zhenduo Hou; Yunkai Zou; Zhen Li; Ding Wang2025
A Binary Code Similarity Detection Method Based on Multi-source Contrastive LearningHongyu Yang; Yunlong Wang; Ze Hu; Xiang Cheng2025
Malware Detection Method Based on Image Sample Reconstruction and Feature EnhancementLixia Xie; Chenyang Wei; Hongyu Yang; Ze Hu; Xiang Cheng2025
Attention-Based Decompilation Through Neural Machine TranslationRuigang Liang; Ying Cao; Peiwei Hu; Kai Chen2025
DBridger: Discovering Vulnerable Data Sharing Paths in Embedded FirmwareLinyu Li; Lei Yu; Qingli Guo; Ruixuan Zhang; Can Yang; Jun Guan; Xiaorui Gong2025
Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart GridJiangang Lu; Yunfan Yang; Qinqin Wu; Benhan Li; Mingxin Lu2025
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain WalletsBirou Gao; Rui Zhang; Yuting Xiao; Huan Zou2025
Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential PrivacyHongfa Ding; Peiwang Fu; Heling Jiang; Xuesong Li; Linjiang Wu2025
12