ISPEC C

28 papers

YearTitle / Authors
2012A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions.
K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
2012A Framework for Security Analysis of Key Derivation Functions.
Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson
2012A Pre-computable Signature Scheme with Efficient Verification for RFID.
Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
2012Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher.
Yanfeng Wang, Wenling Wu, Xiaoli Yu
2012Computational Soundness of Indistinguishability Properties without Computable Parsing.
Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada
2012Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Chong-zhi Gao, Dongqing Xie, Baodian Wei
2012Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family.
Yang-Wai Chow, Willy Susilo
2012Fault Analysis of the KATAN Family of Block Ciphers.
Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2012High-Entropy Visual Identification for Touch Screen Devices.
Nathaniel Wesley Filardo, Giuseppe Ateniese
2012Impossible Differential Attacks on Reduced-Round LBlock.
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
2012Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring.
Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu
2012Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
Mark Dermot Ryan, Ben Smyth, Guilin Wang
2012Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing.
Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
2012Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks.
Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote
2012Linear Cryptanalysis of Reduced-Round ICEBERG.
Yue Sun, Meiqin Wang
2012New Impossible Differential Attacks on Camellia.
Dongxia Bai, Leibo Li
2012New Truncated Differential Cryptanalysis on 3D Block Cipher.
Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2012On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
Zhenfei Zhang, Thomas Plantard, Willy Susilo
2012On the Equivalence of Two Definitions of Visual Cryptography Scheme.
Teng Guo, Feng Liu, Chuan Kun Wu
2012Overcoming Significant Noise: Correlation-Template-Induction Attack.
An Wang, Man Chen, Zongyue Wang, Yaoling Ding
2012Partial Key Exposure on RSA with Private Exponents Larger Than N.
Marc Joye, Tancrède Lepoint
2012Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization.
Shuo Tian, Yeping He, Baozeng Ding
2012Redactable Signatures for Independent Removal of Structure and Content.
Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
2012Secure Distributed Computation of the Square Root and Applications.
Manuel Liedel
2012Structure-Based RSA Fault Attacks.
Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert
2012T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings.
Christian L. F. Corniaux, Hossein Ghodosi
2012Towards Fine-Grained Access Control on Browser Extensions.
Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang
2012iPIN and mTAN for Secure eID Applications.
Johannes Braun, Moritz Horsch, Alexander Wiesmaier