


default search action
11th ACNS 2013: Banff, AB, Canada
- Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini:

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7954, Springer 2013, ISBN 978-3-642-38979-5
Cloud Cryptography
- Mohammad Etemad, Alptekin Küpçü

:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. 1-18 - Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi:

Client-Controlled Cryptography-as-a-Service in the Cloud. 19-36 - Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou

:
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. 37-52 - Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:

Computing on Authenticated Data for Adjustable Predicates. 53-68
Secure Computation
- Shlomi Dolev, Juan A. Garay, Niv Gilboa

, Vladimir Kolesnikov, Yelena Yuditsky:
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract). 69-83 - Sven Laur, Riivo Talviste

, Jan Willemson:
From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. 84-101 - Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:

Private Database Queries Using Somewhat Homomorphic Encryption. 102-118
Hash Function and Block Cipher
- Jean-Philippe Aumasson, Samuel Neves

, Zooko Wilcox-O'Hearn, Christian Winnerlein
:
BLAKE2: Simpler, Smaller, Fast as MD5. 119-135 - Arno Mittelbach:

Cryptophia's Short Combiner for Collision-Resistant Hash Functions. 136-153 - Jacques Patarin:

Generic Attacks for the Xor of k Random Permutations. 154-169 - Yu Sasaki:

Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. 170-185
Signature
- Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng

:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. 186-201 - Kwangsu Lee

, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. 202-217
Group-Oriented Cryptography
- Rikke Bendlin, Sara Krehbiel, Chris Peikert:

How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. 218-236 - Laila El Aimani

, Marc Joye:
Toward Practical Group Encryption. 237-252
System Attack I
- Matthias Schäfer, Vincent Lenders

, Ivan Martinovic:
Experimental Analysis of Attacks on Next Generation Air Traffic Communication. 253-271 - Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng

, Debin Gao
, Yingjiu Li, Jianying Zhou
:
Launching Generic Attacks on iOS with Approved Third-Party Applications. 272-289
Secure Implementation - Hardware
- Erich Wenger:

Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. 290-306 - Michael Henson

, Stephen Taylor:
Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors. 307-321
Secure Implementation - Software
- Ana Helena Sánchez, Francisco Rodríguez-Henríquez:

NEON Implementation of an Attribute-Based Encryption Scheme. 322-338 - Tore Kasper Frederiksen, Jesper Buus Nielsen

:
Fast and Maliciously Secure Two-Party Computation Using the GPU. 339-356 - Aurore Guillevic

:
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. 357-372
System Attack II
- Tilo Müller, Michael Spreitzenbarth:

FROST - Forensic Recovery of Scrambled Telephones. 373-388 - Alexander Wild, Tim Güneysu

, Amir Moradi
:
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. 389-404 - Chee Meng Tey, Payas Gupta, Debin Gao

, Yan Zhang:
Keystroke Timing Analysis of on-the-fly Web Apps. 405-413 - Marc Fischlin, Cristina Onete:

Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. 414-431
Group-Oriented Systems
- N. Asokan

, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider
, Stanislaus Stelle:
CrowdShare: Secure Mobile Resource Sharing. 432-440 - Filip Zagórski

, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex
, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. 441-457
Key Exchange and Leakage Resilience
- Koutarou Suzuki, Kazuki Yoneyama:

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. 458-474 - Maggie E. Habeeb, Delaram Kahrobaei

, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Semidirect Product of (Semi)Groups. 475-486 - Kaoru Kurosawa, Le Trieu Phong:

Leakage Resilient IBE and IPE under the DLIN Assumption. 487-501
Cryptographic Proof
- Ryan Henry

, Ian Goldberg:
Batch Proofs of Partial Knowledge. 502-517 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi

:
Efficient Signatures of Knowledge and DAA in the Standard Model. 518-533
Cryptosystems
- Olivier Blazy

, Céline Chevalier, David Pointcheval
, Damien Vergnaud
:
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. 534-551 - Sonia Bogos, Ioana Boureanu, Serge Vaudenay:

Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. 552-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














