ACNS B

34 papers

YearTitle / Authors
2006A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.
Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal
2006A Handy Multi-coupon System.
Sébastien Canard, Aline Gouget, Emeline Hufschmitt
2006Adaptive Detection of Local Scanners.
Ahren Studer, Chenxi Wang
2006An AES Smart Card Implementation Resistant to Power Analysis Attacks.
Christoph Herbst, Elisabeth Oswald, Stefan Mangard
2006An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.
Dongvu Tonien, Reihaneh Safavi-Naini
2006An Improved Poly1305 MAC.
Dayin Wang, Dongdai Lin, Wenling Wu
2006Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings
Jianying Zhou, Moti Yung, Feng Bao
2006Authentication for Paranoids: Multi-party Secret Handshakes.
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
2006Breaking a New Instance of TTM Cryptosystems.
Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
2006Certificateless Public-Key Signature: Security Model and Efficient Construction.
Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
2006Combinatorial Structures for Design of Wireless Sensor Networks.
Dibyendu Chakrabarti, Jennifer Seberry
2006Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Raphael C.-W. Phan, Bok-Min Goi
2006DSO: Dependable Signing Overlay.
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
2006Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
Ahto Buldas, Sven Laur
2006Effect of Malicious Synchronization.
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
2006Efficient Memory Bound Puzzles Using Pattern Databases.
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
2006Flexible Exponentiation with Resistance to Side Channel Attacks.
Camille Vuillaume, Katsuyuki Okeya
2006High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive.
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi
2006Improving the Randomized Initial Point Countermeasure Against DPA.
Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
2006Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks.
Jonghyup Lee, Taekyoung Kwon, JooSeok Song
2006Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
2006On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
2006On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Xinghua Li, Sang-Jae Moon, Jianfeng Ma
2006Password Based Server Aided Key Exchange .
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
2006Physical Security Bounds Against Tampering.
Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
2006Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.
Jianhua Yang, Yongzhong Zhang
2006Public Key Cryptography Sans Certificates in Ad Hoc Networks.
Nitesh Saxena
2006Real Perfect Contrast Visual Secret Sharing Schemes with Reversing.
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
2006Results on Almost Resilient Functions.
Pinhui Ke, Jie Zhang, Qiaoyan Wen
2006Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Qiang Tang, Kim-Kwang Raymond Choo
2006Stateful Subset Cover.
Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm
2006Syntax-Driven Private Evaluation of Quantified Membership Queries.
Aggelos Kiayias, Antonina Mitrofanova
2006The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
Khoongming Khoo, Guang Gong, Hian-Kiat Lee
2006W3Bcrypt: Encryption as a Stylesheet.
Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis