×

Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. (English) Zbl 1319.94006

Lecture Notes in Computer Science 8957. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). xiii, 547 p. (2015).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1319.94005].
Indexed articles:
Liu, Weiwei; Mu, Yi; Yang, Guomin, An efficient privacy-preserving e-coupon system, 3-15 [Zbl 1368.94114]
Palmieri, Paolo; Calderoni, Luca; Maio, Dario, Spatial Bloom filters: enabling privacy in location-aware applications, 16-36 [Zbl 1391.94785]
Zhang, Tao; Chow, Sherman S. M., Security of direct anonymous authentication using TPM 2.0 signature, 37-48 [Zbl 1400.94189]
Alderman, James; Janson, Christian; Cid, Carlos; Crampton, Jason, Revocation in publicly verifiable outsourced computation, 51-71 [Zbl 1400.94110]
Patsakis, Constantinos; Clear, Michael; Laird, Paul, Private aggregation with custom collusion tolerance, 72-89 [Zbl 1400.94169]
Tang, Fei; Li, Hongda, Ring signatures of constant size without random oracles, 93-108 [Zbl 1400.94173]
Guleria, Vandana; Dutta, Ratna, Universally composable identity based adaptive oblivious transfer with access control, 109-129 [Zbl 1400.94147]
Ding, Ning, Three-round public-coin bounded-auxiliary-input zero-knowledge arguments of knowledge, 130-149 [Zbl 1400.94141]
Arzapalo, Denisse Muñante; Chiprianov, Vanea; Gallon, Laurent; Aniorté, Philippe, A model-driven security requirements approach to deduce security policies based on OrBAC, 150-169 [Zbl 1400.94180]
Boureanu, Ioana; Vaudenay, Serge, Optimal proximity proofs, 170-190 [Zbl 1400.94125]
Liang, Bei; Zhang, Rui; Li, Hongda, Simpler CCA-secure public key encryption from lossy trapdoor functions, 193-206 [Zbl 1400.94162]
Huang, Zhangjie; Hu, Lei; Xu, Jun, Attacking RSA with a composed decryption exponent using unravelled linearization, 207-219 [Zbl 1400.94150]
Wang, Fuqun; Wang, Kunpeng, Fully homomorphic encryption with auxiliary inputs, 220-238 [Zbl 1400.94175]
Lai, Russell W. F.; Cheung, Henry K. F.; Chow, Sherman S. M., Trapdoors for ideal lattices with applications, 239-256 [Zbl 1400.94161]
Bao, Zhenzhen; Zhang, Wentao; Lin, Dongdai, Speeding up the search algorithm for the best differential and best linear trails, 259-285 [Zbl 1400.94115]
Hao, Yonglin, The boomerang attacks on BLAKE and BLAKE2, 286-310 [Zbl 1400.94148]
AlTawy, Riham; Youssef, Amr M., Second preimage analysis of Whirlwind, 311-328 [Zbl 1400.94109]
Yu, Hongbo; Bai, Dongxia, Boomerang attack on step-reduced SHA-512, 329-342 [Zbl 1400.94177]
Agrawal, Megha; Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar, Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique, 343-360 [Zbl 1400.94108]
Chang, Donghoon; Jati, Arpan; Mishra, Sweta; Sanadhya, Somitra Kumar, Rig: a simple, secure and flexible design for password hashing, 361-381 [Zbl 1403.94046]
Bhattacharjee, Debjyoti; Chattopadhyay, Anupam, Efficient hardware accelerator for AEGIS-128 authenticated encryption, 385-402 [Zbl 1403.94043]
Liu, Zhen; Cao, Zhenfu; Wong, Duncan S., Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts, 403-423 [Zbl 1403.94070]
Wang, Changji; Xu, Xilei; Li, Yuan; Shi, Dongyuan, Integrating ciphertext-policy attribute-based encryption with identity-based ring signature to enhance security and privacy in wireless body area networks, 424-442 [Zbl 1403.94086]
Robert, Jean-Marc, Parallelized software implementation of elliptic curve scalar multiplication, 445-462 [Zbl 1403.94075]
Tian, Song; Wang, Kunpeng; Li, Bao; Yu, Wei, A note on Diem’s proof, 463-471 [Zbl 1403.94083]
Hanzlik, Lucjan; Kubiak, Przemysław; Kutyłowski, Mirosław, Stand-by attacks on E-ID password authentication, 475-495 [Zbl 1403.94062]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1319.94005
PDFBibTeX XMLCite
Full Text: DOI