


default search action
13th ACNS 2015: New York, NY, USA
- Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis:

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9092, Springer 2015, ISBN 978-3-319-28165-0
Secure Computation I: Primitives and New Models
- Berry Schoenmakers, Meilof Veeningen:

Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 3-22 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:

Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 23-41 - Jing Xu, Xuexian Hu, Zhenfeng Zhang:

Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. 42-61
Public Key Cryptographic Primitives
- Olivier Blazy

, Céline Chevalier:
Generic Construction of UC-Secure Oblivious Transfer. 65-86 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:

Non-malleability Under Selective Opening Attacks: Implication and Separation. 87-104 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki

:
A Signature Scheme with a Fuzzy Private Key. 105-126 - Zhen Liu, Duncan S. Wong:

Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. 127-146
Secure Computation II: Applications
- Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:

Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. 149-171 - Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:

Private Database Access with HE-over-ORAM Architecture. 172-191 - Jae Hong Seo

, Keita Emura
, Keita Xagawa
, Kazuki Yoneyama:
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. 192-214 - Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang:

LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. 215-239
Anonymity and Related Applications
- Alberto Compagno, Mauro Conti

, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. 243-262 - Satrajit Ghosh, Aniket Kate:

Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). 263-286 - Sébastien Canard, David Pointcheval

, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 287-306 - Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven:

Recovering Lost Device-Bound Credentials. 307-327
Cryptanalysis and Attacks (Symmetric Crypto)
- Aleksandar Kircanski:

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA. 331-349 - Jiqiang Lu, Zhen Li, Matt Henricksen:

Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). 350-369 - Yuval Yarom

, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 370-385
Privacy and Policy Enforcement
- Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:

Cryptographic Enforcement of Information Flow Policies Without Public Information. 389-408 - Florian Kelbert, Alexander Pretschner:

A Fully Decentralized Data Usage Control Enforcement Infrastructure. 409-430 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar

, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 431-453
Authentication via Eye Tracking and Proofs of Proximity
- Dachuan Liu, Bo Dong, Xing Gao, Haining Wang:

Exploiting Eye Tracking for Smartphone Authentication. 457-477 - Handan Kilinç, Serge Vaudenay:

Optimal Proximity Proofs Revisited. 478-494
Malware Analysis and Side Channel Attacks
- Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. 497-517 - Atsushi Takayasu, Noboru Kunihiro

:
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. 518-537 - Cong Chen, Thomas Eisenbarth

, Ingo von Maurich, Rainer Steinwandt:
Differential Power Analysis of a McEliece Cryptosystem. 538-556
Side Channel Countermeasures and Tamper Resistance/PUFs
- Tobias Schneider, Amir Moradi

, Tim Güneysu
:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 559-578 - Jonas Schneider, Dominique Schröder

:
Foundations of Reconfigurable PUFs. 579-594 - Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi

, Omid Kavehei
, Derek Abbott:
mrPUF: A Novel Memristive Device Based Physical Unclonable Function. 595-615
Leakage Resilience and Pseudorandomness
- Bart Mennink, Bart Preneel

:
On the XOR of Multiple Random Permutations. 619-634 - Michel Abdalla

, Sonia Belaïd, David Pointcheval
, Sylvain Ruhault, Damien Vergnaud
:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. 635-654 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti

:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 655-674 - Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing

:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. 675-695

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














