default search action
8th ACNS 2010: Beijing, China
- Jianying Zhou, Moti Yung:
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings. Lecture Notes in Computer Science 6123, 2010, ISBN 978-3-642-13707-5
Public Key Encryption
- Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. 1-18 - Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing:
How to Construct Interval Encryption from Binary Tree Encryption. 19-34 - Xavier Boyen, Brent Waters:
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. 35-52
Digital Signature
- Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee:
Trapdoor Sanitizable Signatures Made Easy. 53-68 - Markus Rückert, Michael Schneider, Dominique Schröder:
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. 69-86 - Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. 87-104
Block Ciphers and Hash Functions
- Yuechuan Wei, Ping Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. 105-122 - Baudoin Collard, François-Xavier Standaert:
Multi-trail Statistical Saturation Attacks. 123-138 - Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . 139-153 - Nicolas Méloni, Christophe Nègre, M. Anwar Hasan:
High Performance GHASH Function for Long Messages. 154-167
Side-Channel Attacks
- Jiqiang Lu, Jing Pan, Jerry den Hartog:
Principles on the Security of AES against First and Second-Order Differential Power Analysis. 168-185 - Nicolas Veyrat-Charvillon, François-Xavier Standaert:
Adaptive Chosen-Message Side-Channel Attacks. 186-199 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Secure Multiplicative Masking of Power Functions. 200-217
Zero Knowledge and Multi-party Protocols
- Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud:
Batch Groth-Sahai. 218-235 - Matthew K. Franklin, Payman Mohassel:
Efficient and Secure Evaluation of Multivariate Polynomials and Applications. 236-254 - Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen:
Efficient Implementation of the Orlandi Protocol. 255-272 - Aggelos Kiayias, Serdar Pehlivanoglu:
Improving the Round Complexity of Traitor Tracing Schemes. 273-290
Key Management
- Julien Bringer, Hervé Chabanne, Thomas Icart:
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. 291-308 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. 309-328 - Andrew Chi-Chih Yao, Yunlei Zhao:
Deniable Internet Key Exchange. 329-348
Authentication and Identification
- Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. 349-366 - Chengfang Fang, Qiming Li, Ee-Chien Chang:
Secure Sketch for Multiple Secrets. 367-383 - Atefeh Mashatan, Serge Vaudenay:
A Message Recognition Protocol Based on Standard Assumptions. 384-401
Privacy and Anonymity
- Mark Manulis, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. 402-419 - Mark Manulis, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. 420-437 - Helger Lipmaa, Bingsheng Zhang:
Two New Efficient PIR-Writing Protocols. 438-455 - Bogdan Carbunar, Radu Sion:
Regulatory Compliant Oblivious RAM. 456-474
RFID Security and Privacy
- Junzuo Lai, Robert H. Deng, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. 475-492 - Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
On RFID Privacy with Mutual Authentication and Tag Corruption. 493-510
Internet Security
- Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu:
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. 511-528 - Wei Xu, Sencun Zhu, Heng Xu:
COP: A Step toward Children Online Privacy. 529-544 - Xuhua Ding:
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. 545-562
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.