default search action
12th ACNS 2014: Lausanne, Switzerland
- Ioana Boureanu, Philippe Owesarski, Serge Vaudenay:
Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Lecture Notes in Computer Science 8479, Springer 2014, ISBN 978-3-319-07535-8
Key Exchange
- Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk:
New Modular Compilers for Authenticated Key Exchange. 1-18 - Kazuki Yoneyama:
Password-Based Authenticated Key Exchange without Centralized Trusted Setup. 19-36 - Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov:
A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. 37-43
Primitive Construction
- Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Improved Constructions of PRFs Secure Against Related-Key Attacks. 44-61 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Multi-server Private Information Retrieval. 62-79 - Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. 80-96 - Jia Xu, Jianying Zhou:
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. 97-115 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Private Message Transmission Using Disjoint Paths. 116-133
Attacks (Public-Key Cryptography)
- Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie:
Partial Key Exposure Attacks on Takagi's Variant of RSA. 134-150 - Yao Lu, Rui Zhang, Dongdai Lin:
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. 151-162 - Taechan Kim, Mehdi Tibouchi:
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. 163-180
Hashing
- Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. 181-198 - Franziskus Kiefer, Mark Manulis:
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. 199-216 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sakura: A Flexible Coding for Tree Hashing. 217-234 - Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta:
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions. 235-252
Cryptanalysis & Attacks (Symmetric Cryptography)
- Yu Sasaki:
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. 253-270 - Céline Blondeau, Andrey Bogdanov, Meiqin Wang:
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. 271-288 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. 289-307 - Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. 308-323 - Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. 324-342
Network Security
- Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík:
Improving Intrusion Detection Systems for Wireless Sensor Networks. 343-360 - Zhe Liu, Erich Wenger, Johann Großschädl:
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. 361-379 - Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:
BackRef: Accountability in Anonymous Communication Networks. 380-400 - Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin:
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. 401-418
Signatures
- Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. 419-437 - Sabyasachi Karati, Abhijit Das:
Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. 438-456 - Henrich Christopher Pöhls, Kai Samelin:
On Updatable Redactable Signatures. 457-475 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte:
Practical Signatures from the Partial Fourier Recovery Problem. 476-493
System Security
- Brett Cooley, Haining Wang, Angelos Stavrou:
Activity Spoofing and Its Defense in Android Smartphones. 494-512 - Xinran Wang, Tadayoshi Kohno, Bob Blakley:
Polymorphism as a Defense for Automated Attack of Websites. 513-530 - Haya Schulmann, Michael Waidner:
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. 531-548
Secure Computation
- Sébastien Canard, Julien Devigne, Olivier Sanders:
Delegating a Pairing Can Be Both Secure and Efficient. 549-565 - Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. 566-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.