default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2015.bht:"
@inproceedings{DBLP:conf/acns/0001KMR15, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {675--695}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_33}, doi = {10.1007/978-3-319-28166-7\_33}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/0001KMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {635--654}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_31}, doi = {10.1007/978-3-319-28166-7\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AndrychowiczMP15, author = {Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {655--674}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_32}, doi = {10.1007/978-3-319-28166-7\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AndrychowiczMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaldimtsiCHKLN15, author = {Foteini Baldimtsi and Jan Camenisch and Lucjan Hanzlik and Stephan Krenn and Anja Lehmann and Gregory Neven}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Recovering Lost Device-Bound Credentials}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {307--327}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_15}, doi = {10.1007/978-3-319-28166-7\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaldimtsiCHKLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaronDLO15, author = {Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Communication-Optimal Proactive Secret Sharing for Dynamic Groups}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {23--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_2}, doi = {10.1007/978-3-319-28166-7\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaronDLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlazyC15, author = {Olivier Blazy and C{\'{e}}line Chevalier}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Generic Construction of UC-Secure Oblivious Transfer}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {65--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_4}, doi = {10.1007/978-3-319-28166-7\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BlazyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Scalable Divisible E-cash}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {287--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_14}, doi = {10.1007/978-3-319-28166-7\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenEMS15, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Differential Power Analysis of a McEliece Cryptosystem}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {538--556}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_26}, doi = {10.1007/978-3-319-28166-7\_26}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChenEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CompagnoCGMT15, author = {Alberto Compagno and Mauro Conti and Paolo Gasti and Luigi Vincenzo Mancini and Gene Tsudik}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {243--262}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_12}, doi = {10.1007/978-3-319-28166-7\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CompagnoCGMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CramptonFGJP15, author = {Jason Crampton and Naomi Farley and Gregory Z. Gutin and Mark Jones and Bertram Poettering}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Cryptographic Enforcement of Information Flow Policies Without Public Information}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {389--408}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_19}, doi = {10.1007/978-3-319-28166-7\_19}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CramptonFGJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GaoRAKA15, author = {Yansong Gao and Damith Chinthana Ranasinghe and Said F. Al{-}Sarawi and Omid Kavehei and Derek Abbott}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {mrPUF: {A} Novel Memristive Device Based Physical Unclonable Function}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {595--615}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_29}, doi = {10.1007/978-3-319-28166-7\_29}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GaoRAKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GentryHJ015, author = {Craig Gentry and Shai Halevi and Charanjit S. Jutla and Mariana Raykova}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Private Database Access with HE-over-ORAM Architecture}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {172--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_9}, doi = {10.1007/978-3-319-28166-7\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GentryHJ015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GhoshK15, author = {Satrajit Ghosh and Aniket Kate}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget)}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {263--286}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_13}, doi = {10.1007/978-3-319-28166-7\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GhoshK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GhoshOT15, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Zero-Knowledge Authenticated Order Queries and Order Statistics on a List}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {149--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_8}, doi = {10.1007/978-3-319-28166-7\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GhoshOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuangLMC15, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Non-malleability Under Selective Opening Attacks: Implication and Separation}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {87--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_5}, doi = {10.1007/978-3-319-28166-7\_5}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HuangLMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JiangLWLW15, author = {Weiyu Jiang and Jingqiang Lin and Zhan Wang and Huorong Li and Lei Wang}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {215--239}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_11}, doi = {10.1007/978-3-319-28166-7\_11}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/JiangLWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KelbertP15, author = {Florian Kelbert and Alexander Pretschner}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {A Fully Decentralized Data Usage Control Enforcement Infrastructure}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {409--430}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_20}, doi = {10.1007/978-3-319-28166-7\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KelbertP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KilincV15, author = {Handan Kilin{\c{c}} and Serge Vaudenay}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Optimal Proximity Proofs Revisited}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {478--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_23}, doi = {10.1007/978-3-319-28166-7\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KilincV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Kircanski15, author = {Aleksandar Kircanski}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver {URSA}}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {331--349}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_16}, doi = {10.1007/978-3-319-28166-7\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Kircanski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuDGW15, author = {Dachuan Liu and Bo Dong and Xing Gao and Haining Wang}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Exploiting Eye Tracking for Smartphone Authentication}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {457--477}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_22}, doi = {10.1007/978-3-319-28166-7\_22}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuDGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuW15, author = {Zhen Liu and Duncan S. Wong}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {127--146}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_7}, doi = {10.1007/978-3-319-28166-7\_7}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuLH15, author = {Jiqiang Lu and Zhen Li and Matt Henricksen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Time-Memory Trade-Off Attack on the {GSM} {A5/1} Stream Cipher Using Commodity {GPGPU} - (Extended Abstract)}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {350--369}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_17}, doi = {10.1007/978-3-319-28166-7\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MenninkP15, author = {Bart Mennink and Bart Preneel}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {On the {XOR} of Multiple Random Permutations}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {619--634}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_30}, doi = {10.1007/978-3-319-28166-7\_30}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MenninkP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MingXLW0M15, author = {Jiang Ming and Zhi Xin and Pengwei Lan and Dinghao Wu and Peng Liu and Bing Mao}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {497--517}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_24}, doi = {10.1007/978-3-319-28166-7\_24}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MingXLW0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchneiderMG15, author = {Tobias Schneider and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {559--578}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_27}, doi = {10.1007/978-3-319-28166-7\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchneiderMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchneiderS15, author = {Jonas Schneider and Dominique Schr{\"{o}}der}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Foundations of Reconfigurable PUFs}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {579--594}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_28}, doi = {10.1007/978-3-319-28166-7\_28}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/SchneiderS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchoenmakersV15, author = {Berry Schoenmakers and Meilof Veeningen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_1}, doi = {10.1007/978-3-319-28166-7\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchoenmakersV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SeoEXY15, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {192--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_10}, doi = {10.1007/978-3-319-28166-7\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SeoEXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SimeonovskiBA0M15, author = {Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {431--453}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_21}, doi = {10.1007/978-3-319-28166-7\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/SimeonovskiBA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Takahashi0MHN15, author = {Kenta Takahashi and Takahiro Matsuda and Takao Murakami and Goichiro Hanaoka and Masakatsu Nishigaki}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {A Signature Scheme with a Fuzzy Private Key}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {105--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_6}, doi = {10.1007/978-3-319-28166-7\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Takahashi0MHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TakayasuK15, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Partial Key Exposure Attacks on {CRT-RSA:} Better Cryptanalysis to Full Size Encryption Exponents}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {518--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_25}, doi = {10.1007/978-3-319-28166-7\_25}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TakayasuK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuHZ15, author = {Jing Xu and Xuexian Hu and Zhenfeng Zhang}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {42--61}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_3}, doi = {10.1007/978-3-319-28166-7\_3}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YaromLR15, author = {Yuval Yarom and Gefei Li and Damith Chinthana Ranasinghe}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {370--385}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_18}, doi = {10.1007/978-3-319-28166-7\_18}, timestamp = {Fri, 02 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/YaromLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2015, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7}, doi = {10.1007/978-3-319-28166-7}, isbn = {978-3-319-28165-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.