default search action
11th ACNS 2013: Banff, AB, Canada
- Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini:
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7954, Springer 2013, ISBN 978-3-642-38979-5
Cloud Cryptography
- Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. 1-18 - Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Client-Controlled Cryptography-as-a-Service in the Cloud. 19-36 - Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou:
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. 37-52 - Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. 53-68
Secure Computation
- Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky:
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract). 69-83 - Sven Laur, Riivo Talviste, Jan Willemson:
From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. 84-101 - Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. 102-118
Hash Function and Block Cipher
- Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein:
BLAKE2: Simpler, Smaller, Fast as MD5. 119-135 - Arno Mittelbach:
Cryptophia's Short Combiner for Collision-Resistant Hash Functions. 136-153 - Jacques Patarin:
Generic Attacks for the Xor of k Random Permutations. 154-169 - Yu Sasaki:
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. 170-185
Signature
- Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. 186-201 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. 202-217
Group-Oriented Cryptography
- Rikke Bendlin, Sara Krehbiel, Chris Peikert:
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. 218-236 - Laila El Aimani, Marc Joye:
Toward Practical Group Encryption. 237-252
System Attack I
- Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Experimental Analysis of Attacks on Next Generation Air Traffic Communication. 253-271 - Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou:
Launching Generic Attacks on iOS with Approved Third-Party Applications. 272-289
Secure Implementation - Hardware
- Erich Wenger:
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. 290-306 - Michael Henson, Stephen Taylor:
Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors. 307-321
Secure Implementation - Software
- Ana Helena Sánchez, Francisco Rodríguez-Henríquez:
NEON Implementation of an Attribute-Based Encryption Scheme. 322-338 - Tore Kasper Frederiksen, Jesper Buus Nielsen:
Fast and Maliciously Secure Two-Party Computation Using the GPU. 339-356 - Aurore Guillevic:
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. 357-372
System Attack II
- Tilo Müller, Michael Spreitzenbarth:
FROST - Forensic Recovery of Scrambled Telephones. 373-388 - Alexander Wild, Tim Güneysu, Amir Moradi:
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. 389-404 - Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang:
Keystroke Timing Analysis of on-the-fly Web Apps. 405-413 - Marc Fischlin, Cristina Onete:
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. 414-431
Group-Oriented Systems
- N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle:
CrowdShare: Secure Mobile Resource Sharing. 432-440 - Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. 441-457
Key Exchange and Leakage Resilience
- Koutarou Suzuki, Kazuki Yoneyama:
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. 458-474 - Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Semidirect Product of (Semi)Groups. 475-486 - Kaoru Kurosawa, Le Trieu Phong:
Leakage Resilient IBE and IPE under the DLIN Assumption. 487-501
Cryptographic Proof
- Ryan Henry, Ian Goldberg:
Batch Proofs of Partial Knowledge. 502-517 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi:
Efficient Signatures of Knowledge and DAA in the Standard Model. 518-533
Cryptosystems
- Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. 534-551 - Sonia Bogos, Ioana Boureanu, Serge Vaudenay:
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. 552-569
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.