


default search action
12th ACNS 2014: Lausanne, Switzerland
- Ioana Boureanu, Philippe Owesarski, Serge Vaudenay:

Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Lecture Notes in Computer Science 8479, Springer 2014, ISBN 978-3-319-07535-8
Key Exchange
- Yong Li, Sven Schäge

, Zheng Yang, Christoph Bader, Jörg Schwenk:
New Modular Compilers for Authenticated Key Exchange. 1-18 - Kazuki Yoneyama:

Password-Based Authenticated Key Exchange without Centralized Trusted Setup. 19-36 - Martin Kreuzer

, Alexey D. Myasnikov, Alexander Ushakov
:
A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. 37-43
Primitive Construction
- Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:

Improved Constructions of PRFs Secure Against Related-Key Attacks. 44-61 - Liang Feng Zhang, Reihaneh Safavi-Naini:

Verifiable Multi-server Private Information Retrieval. 62-79 - Giuseppe Ateniese, Antonio Faonio

, Bernardo Magri
, Breno de Medeiros:
Certified Bitcoins. 80-96 - Jia Xu

, Jianying Zhou
:
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. 97-115 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Private Message Transmission Using Disjoint Paths. 116-133
Attacks (Public-Key Cryptography)
- Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie:

Partial Key Exposure Attacks on Takagi's Variant of RSA. 134-150 - Yao Lu, Rui Zhang, Dongdai Lin:

New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. 151-162 - Taechan Kim

, Mehdi Tibouchi
:
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. 163-180
Hashing
- Zongyang Zhang, Yu Chen, Sherman S. M. Chow

, Goichiro Hanaoka, Zhenfu Cao
, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. 181-198 - Franziskus Kiefer

, Mark Manulis
:
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. 199-216 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sakura: A Flexible Coding for Tree Hashing. 217-234 - Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta:

Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions. 235-252
Cryptanalysis & Attacks (Symmetric Cryptography)
- Yu Sasaki:

Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. 253-270 - Céline Blondeau, Andrey Bogdanov

, Meiqin Wang:
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. 271-288 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. 289-307 - Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:

Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. 308-323 - Amir Moradi

, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. 324-342
Network Security
- Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík:

Improving Intrusion Detection Systems for Wireless Sensor Networks. 343-360 - Zhe Liu, Erich Wenger, Johann Großschädl:

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. 361-379 - Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:

BackRef: Accountability in Anonymous Communication Networks. 380-400 - Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder

, Mark Simkin:
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. 401-418
Signatures
- Nuttapong Attrapadung, Keita Emura

, Goichiro Hanaoka, Yusuke Sakai:
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. 419-437 - Sabyasachi Karati, Abhijit Das:

Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. 438-456 - Henrich Christopher Pöhls, Kai Samelin:

On Updatable Redactable Signatures. 457-475 - Jeffrey Hoffstein

, Jill Pipher, John M. Schanck, Joseph H. Silverman
, William Whyte:
Practical Signatures from the Partial Fourier Recovery Problem. 476-493
System Security
- Brett Cooley, Haining Wang, Angelos Stavrou

:
Activity Spoofing and Its Defense in Android Smartphones. 494-512 - Xinran Wang, Tadayoshi Kohno, Bob Blakley:

Polymorphism as a Defense for Automated Attack of Websites. 513-530 - Haya Schulmann, Michael Waidner

:
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. 531-548
Secure Computation
- Sébastien Canard, Julien Devigne, Olivier Sanders:

Delegating a Pairing Can Be Both Secure and Efficient. 549-565 - Florian Kerschbaum, Thomas Schneider

, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. 566-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














