主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
企业门户
起重机械
生产工程
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Information Security and Cryptology
会议名
20th International Conference on Information Security and Cryptology (Inscrypt 2024)
中译名
《第二十届国际信息安全与密码学会议,卷2》
机构
International Association for Cryptologic Research (IACR)
会议日期
December 14-16, 2024
会议地点
Kunming, China
出版年
2025
馆藏号
356948
题名
作者
出版年
Extended Policy-Based Sanitizable Signatures
Ismail Afia; Riham AlTawy
2025
Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations
Siyue Yao; Zhikang Xie; Man Ho Au
2025
Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage
Futai Zhang; Yichi Huang; Wenjie Yang; Jinmei Tian
2025
Generalized Cryptanalysis of Cubic Pell RSA
Hao Kang; Mengce Zheng
2025
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms
George Teseleanu
2025
Hierarchical Functional Encryption for Quadratic Transformation
Jun Zhao; Kai Zhang; Junqing Gong; Haifeng Qian
2025
Solving Modular Linear Equations via Automated Coppersmith and Its Applications
Yansong Feng; Zhen Liu; Abderrahmane Nitaj; Yanbin Pan
2025
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography
Huixuan Jin; Cong Peng; Jintao Fu; Min Luo
2025
Permutation Argument via Bases Transformation
Yu Wang
2025
Efficient and Verifiable Multi-server Framework for Secure Information Classification and Storage
Ziqing Guo; Yaohui Wang; Xuanyu Jin; Xiuhua Wang; Yuanyuan He; Yueyue Dai
2025
Formal Analysis of WAPI Authentication and Key Agreement Protocol
Zhongqi Lv; Hui Li; Haisong Ye; Chi Ma; Jingjing Guan
2025
Committing Security of AEAD Based on Stream Cipher
Xueqi Zhu; Yan Jia; Jun Xu; Peng Wang
2025
Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method
Xinming Zhu; Shihui Zheng; Zihao Han
2025
Cube Attacks Against Trivium, Kreyvium and ACORN with Practical Complexity
Yanqi Chen; Ting Li; Yao Sun
2025
Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers
Jingsui Weng; Wentao Zhang; Ting Peng; Tianyou Ding
2025
A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT
Jiahao Zhao; Qianqian Yang; Ling Song; Lei Hu
2025
An Automatic Search Method for 4-Bit Optimal S-Boxes Towards Considering Cryptographic Properties and Hardware Area Simultaneously
Hongtao Hu; Chenhao Jia; Qing Ling; Sijia Gong; Ting Wu; Tingting Cui
2025
Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations Improved Attacks on TWINE and LBlock
Shiqi Hou; Muzhou Li; Kai Hu; Shichang Wang; Bart Preneel
2025
Cryptanalysis of BAKSHEESH Block Cipher
Shengyuan Xu; Siwei Chen; Xiutao Feng; Zejun Xiang; Xiangyong Zeng
2025
Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack
Boyun Li; Qun Liu
2025
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2025