Skip to main content

previous disabled Page of 6
and
Your search also matched 495 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A True Random Number Generator Based on ADC Random Interval Sampling

Include preview-only content
  1. Chapter and Conference Paper

    Rotational Cryptanalysis from a Differential-Linear Perspective

    The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluat...

    Yunwen Liu, Siwei Sun, Chao Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  2. Chapter and Conference Paper

    A \(2^{n/2}\) -Time Algorithm for \(\sqrt{n}\) -SVP and \(\sqrt{n}\) -Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP

    We show a \(2^{n/2+o(n)}\) 2 ...

    Divesh Aggarwal, Zeyong Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  3. Chapter and Conference Paper

    On the Security of Homomorphic Encryption on Approximate Numbers

    We present passive attacks against CKKS, the homomorphic encryption scheme for arithmetic on approximate numbers presented at Asiacrypt 2017. The attack is both theoretically efficient (running in expected pol...

    Baiyu Li, Daniele Micciancio in Advances in Cryptology – EUROCRYPT 2021 (2021)

  4. Chapter and Conference Paper

    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

    The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...

    Zhenzhen Bao, **aoyang Dong, Jian Guo, Zheng Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  5. Book and Conference Proceedings

    Cyber Security

    17th China Annual Conference, CNCERT 2020, Bei**g, China, August 12, 2020, Revised Selected Papers

    Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Wei** Wen in Communications in Computer and Information Science (2020)

  6. Chapter and Conference Paper

    A Survey on Cyberspace Search Engines

    This paper introduces the concept of cyberspace search engine, and makes a deep survey on 5 well-known search engines, say Shodan, Censys, BinaryEdge, ZoomEye and Fofa, by querying official websites, analyzing...

    Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, Lihuang Zhu in Cyber Security (2020)

  7. Chapter and Conference Paper

    Research Status and Prospect of Blockchain Technology in Agriculture Field

    Agriculture 4.0 is the era of integrating intelligent technologies in agriculture. Problems such as low informatization, food safety, high management cost and imbalance between supply and demand in agriculture...

    Dawei Xu, Weiqi Wang, Liehuang Zhu, Ruiguang Li in Cyber Security (2020)

  8. Chapter and Conference Paper

    Mind the Propagation of States

    Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of thei...

    **chao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian in Advances in Cryptology – ASIACRYPT 2020 (2020)

  9. Chapter and Conference Paper

    Crowdsourcing Under Data Poisoning Attacks: A Comparative Study

    Crowdsourcing is a paradigm that provides a cost-effective solution for obtaining services or data from a large group of users. It is increasingly being used in modern society for data collection in domains su...

    Farnaz Tahmasebian, Li **ong, Mani Sotoodeh in Data and Applications Security and Privacy… (2020)

  10. Chapter and Conference Paper

    Leakage-Resilient Key Exchange and Two-Seed Extractors

    Can Alice and Bob agree on a uniformly random secret key without having any truly secret randomness to begin with? Here we consider a setting where Eve can get partial leakage on the internal state of both Ali...

    **n Li, Fermi Ma, Willy Quach, Daniel Wichs in Advances in Cryptology – CRYPTO 2020 (2020)

  11. Chapter and Conference Paper

    MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks

    Web-based cryptocurrency mining attacks, also known as cryptojacking, become increasingly popular. A large number of diverse platforms (e.g., Windows, Linux, Android, and iOS) and devices (e.g., PC, smartphone...

    Guorui Yu, Guangliang Yang, Tongxin Li, **nhui Han, Shijie Guan in Cyber Security (2020)

  12. Chapter and Conference Paper

    Non-malleability Against Polynomial Tampering

    We present the first explicit construction of a non-malleable code that can handle tampering functions that are bounded-degree polynomials. Prior to our work, this was only known for degree-1 polynomials (affine ...

    Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao in Advances in Cryptology – CRYPTO 2020 (2020)

  13. Chapter and Conference Paper

    Slide Reduction, Revisited—Filling the Gaps in SVP Approximation

    We show how to generalize Gama and Nguyen’s slide reduction algorithm [STOC ’08] for solving the approximate Shortest Vector Problem over lattices (SVP) to allow for arbitrary block sizes, rather than just blo...

    Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen in Advances in Cryptology – CRYPTO 2020 (2020)

  14. Chapter and Conference Paper

    Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering

    Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018) as a generalization of standard error correcting codes to handle severe forms of tampering on codewords. This notion has attr...

    Eshan Chattopadhyay, **n Li in Theory of Cryptography (2020)

  15. Chapter and Conference Paper

    CCA Updatable Encryption Against Malicious Re-encryption Attacks

    Updatable encryption (UE) is an attractive primitive, which allows the secret key of the outsourced encrypted data to be updated to a fresh one periodically. Several elegant works exist studying various securi...

    Long Chen, Yanan Li, Qiang Tang in Advances in Cryptology – ASIACRYPT 2020 (2020)

  16. Chapter and Conference Paper

    Your Device and Your Power, My Bitcoin

    The dramatic increase of cryptocurrency price has reshaped the cyber security landscape. Many IoT malwares are created, turning many kinds of infected IoT devices into crypto currency mining machines. Crypto ...

    Song Li, Scott Wu in Blockchain – ICBC 2018 (2018)

  17. Chapter and Conference Paper

    A Design of Digital Rights Management Mechanism Based on Blockchain Technology

    Digital rights management (DRM) has been widely used in digital content protection nowadays and has made a great contribution to the protection of digital content. However, the traditional DRM technology has s...

    Zehao Zhang, Li Zhao in Blockchain – ICBC 2018 (2018)

  18. Chapter and Conference Paper

    Improved Anonymous Broadcast Encryptions

    We investigate anonymous broadcast encryptions (ANOBE) in which a ciphertext hides not only the message but also the target recipients associated with it. Following Libert et al.’s generic construction [PKC, 2012...

    Jiangtao Li, Junqing Gong in Applied Cryptography and Network Security (2018)

  19. Chapter and Conference Paper

    Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices

    Boyen and Li [AsiaCrypt, 2016] proposed the first almost tightly secure lattice identity-based encryption scheme in the standard model. The security of such scheme is proved under learning with errors assumpti...

    Xavier Boyen, Qinyi Li in Applied Cryptography and Network Security (2018)

  20. Chapter and Conference Paper

    Mutually Private Location Proximity Detection with Access Control

    Mobile application users want to consume location-based services without disclosing their locations and data owners (DO) want to provide different levels of service based on consumer classifications, sometimes...

    Michael G. Solomon, Vaidy Sunderam, Li **ong in Data and Applications Security and Privacy… (2017)

previous disabled Page of 6