会议文集


文集名Information Security and Cryptology
会议名20th International Conference on Information Security and Cryptology (Inscrypt 2024)
中译名《第二十届国际信息安全与密码学会议,卷2》
机构International Association for Cryptologic Research (IACR)
会议日期December 14-16, 2024
会议地点Kunming, China
出版年2025
馆藏号356948


题名作者出版年
Extended Policy-Based Sanitizable SignaturesIsmail Afia; Riham AlTawy2025
Practical Generic Construction of Fully Collision Resistant Chameleon Hash and InstantiationsSiyue Yao; Zhikang Xie; Man Ho Au2025
Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud StorageFutai Zhang; Yichi Huang; Wenjie Yang; Jinmei Tian2025
Generalized Cryptanalysis of Cubic Pell RSAHao Kang; Mengce Zheng2025
On Concrete Security Treatment of Signatures Based on Multiple Discrete LogarithmsGeorge Teseleanu2025
Hierarchical Functional Encryption for Quadratic TransformationJun Zhao; Kai Zhang; Junqing Gong; Haifeng Qian2025
Solving Modular Linear Equations via Automated Coppersmith and Its ApplicationsYansong Feng; Zhen Liu; Abderrahmane Nitaj; Yanbin Pan2025
How to Construct Public Timeline for RSA-Formed Time-Lock CryptographyHuixuan Jin; Cong Peng; Jintao Fu; Min Luo2025
Permutation Argument via Bases TransformationYu Wang2025
Efficient and Verifiable Multi-server Framework for Secure Information Classification and StorageZiqing Guo; Yaohui Wang; Xuanyu Jin; Xiuhua Wang; Yuanyuan He; Yueyue Dai2025
Formal Analysis of WAPI Authentication and Key Agreement ProtocolZhongqi Lv; Hui Li; Haisong Ye; Chi Ma; Jingjing Guan2025
Committing Security of AEAD Based on Stream CipherXueqi Zhu; Yan Jia; Jun Xu; Peng Wang2025
Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction MethodXinming Zhu; Shihui Zheng; Zihao Han2025
Cube Attacks Against Trivium, Kreyvium and ACORN with Practical ComplexityYanqi Chen; Ting Li; Yao Sun2025
Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based CiphersJingsui Weng; Wentao Zhang; Ting Peng; Tianyou Ding2025
A Note on Neutral Bits for ARX Ciphers from the Perspective of BCTJiahao Zhao; Qianqian Yang; Ling Song; Lei Hu2025
An Automatic Search Method for 4-Bit Optimal S-Boxes Towards Considering Cryptographic Properties and Hardware Area SimultaneouslyHongtao Hu; Chenhao Jia; Qing Ling; Sijia Gong; Ting Wu; Tingting Cui2025
Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations Improved Attacks on TWINE and LBlockShiqi Hou; Muzhou Li; Kai Hu; Shichang Wang; Bart Preneel2025
Cryptanalysis of BAKSHEESH Block CipherShengyuan Xu; Siwei Chen; Xiutao Feng; Zejun Xiang; Xiangyong Zeng2025
Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery AttackBoyun Li; Qun Liu2025
12