


default search action
21st Inscrypt 2025: Xi'an, China - Part I
- Rongmao Chen

, Robert H. Deng
, Moti Yung
:
Information Security and Cryptology - 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I. Lecture Notes in Computer Science 16408, Springer 2026, ISBN 978-981-95-6205-3
Post-quantum Cryptography
- Shengye Song, Zhongxiao Wang, Hong Xu, Qunxiong Zheng, Xiaoxin Zhao:

Further Research on Meet-LWE and Its Application to Weakened Kyber. 3-20 - Souad N'Ait Bella, Yunusa Simpa Abdulsalam, Mustapha Hedabou:

Efficient Implementation of Post-quantum Signature Algorithms for Next Generation of Blockchains. 21-42 - Jingwei Feng, Baofeng Wu, Dongdai Lin, Binwu Xiang:

Accelerating NTRU-Based Bootstrapping with Block Key Distributions. 43-62 - Guotao Chai, Renjie Jin, Shuoqu Jian, Longjiang Qu:

Lattice IBE from Non-spherical Gaussian Sampling with Tight Security. 63-82 - Zhen Han, Jia-Si Weng, Sen Dong, Jian Weng:

Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE. 83-102 - Jingyi Xu, Yingming Zeng, Wei Deng, Lei Han, Chong Luo:

An Area-Performance Balanced Hardware Accelerator of NTT for Kyber. 103-120 - Weiping Ji, Siu-Ming Yiu, Zichen Li, Yanmin Zhao:

A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation. 121-141 - Jiacheng Li, Haodong Jiang, Hong Wang, Qianheng Duan:

Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model. 142-165 - Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie, Yunlv Lv:

Speedy Error Reconciliation. 166-186
Functional Encryption
- Dingding Jia:

A Note on the Simpler Construction to Achieve Dynamic FE via IBE. 189-209 - Daichong Chao, Liehuang Zhu, Dawei Xu, Tong Wu, Chuan Zhang, Fuchun Guo:

Onion Encryption Revisited: Relations Among Security Notions. 210-228 - Haoyang Wang, Tianning Wang, Guilin Wang:

New Key Combiner Schemes for Multiple Keys. 229-247 - Zinan Shen, Xinyu Feng, Xu Dong, Cong Li, Qingni Shen:

Wildcarded Identity-Based Inner Product Encryption Based on SM9. 248-268 - Yalong Wang, Cong Peng, Qi Feng, Yulin Liu, Xiaohong Li:

Dual-Threshold Verifiable Witness Encryption for Signatures and Its Applications. 269-289
Cryptanalysis and Implementations I
- Yingkai Wei, Qun Liu, Boyun Li, Zengpeng Li:

Improved Quantum Cryptanalysis on Generalized Feistel Structure. 293-312 - Zhenguo Yan, Zhiyu Zhang, Shuai Chang, Lei Hu:

Algebraic Cryptanalysis on Reduced-Round Trivium-LE. 313-333 - Hongyu Lu, Qun Liu, Boyun Li, Jingbo Qiao, Jingwen Chen, Meiqin Wang:

Automated Periodic Distinguisher Search for AND-RX Ciphers. 334-353 - Yanqi Chen, Yao Sun:

Efficient Reconstruction of S-Boxes from Partial Cryptographic Tables via MILP Modeling. 354-372 - Min Guan, Juan Xu, Jian Lei:

Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification. 373-387 - Lingmei Xiao, Vladimir Edemskiy:

Arithmetic Autocorrelation of Certain Binary Half-ℓ-Sequences. 388-397 - Chen Wang, Muzhou Li, Meiqin Wang:

Related-Key Rectangle Attacks on Round-Reduced TWINE. 398-419 - Xinhai Wang, Lin Ding, Zhengting Li, Jiang Wan, Tairong Shi:

TwoLayerF: A Two-Layer Framework of PNB-Based Key Recovery Attacks on ChaCha. 420-439 - Longxiang Wei, Hao Lei, Kai Hu, Liu Zhang, Meiqin Wang:

Exploring AI-Assisted Cryptanalytic Attacks on Multisets. 440-459 - Kun Zhang, Tao Shang, Yuanjing Zhang, Jianwei Liu:

Distributed Quantum Key Recovery Attack on Pseudorandom Functions. 460-478
Cryptanalysis and Implementations II
- Ao Shen, Ding Deng, Yangbo Huang, Pengyue Sun, Feixue Wang:

An Area-Efficient Design of ZUC-256 Through Hardware Optimization. 481-495 - Xujing Wu, Jinliang Wang, Runhao Wei, Yunling Zhang, Meiqin Wang:

Revisit Bitslice Implementation of Dummy Shuffling. 496-511 - Yuxuan Meng, Baosheng Wang, Qianqian Xing, Xiaofeng Wang, Yi Wang:

TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation. 512-529 - Xijie Ba, Qin Liu, Xiaohong Li, Jianting Ning:

Leakage-Abuse Attack Against Substring-SSE with Partially Known Dataset. 530-549 - Yang Yi, Zhu Wang, Jianfeng Du, Aimin Yu:

Bit-By-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation. 550-568 - Ruizhong Du, Jiahao Wang, Mingyue Li:

Multi-feature Fusion Leakage Abuse Attacks Against Dynamic Searchable Symmetric Encryption. 569-588 - Qian Du, Jinnuo Li, Ziran Lin, Chi Cheng:

A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack Against Kyber. 589-608

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














