ACNS B

32 papers

YearTitle / Authors
2007A More Natural Way to Construct Identity-Based Identification Schemes.
Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
2007A New Protocol for Conditional Disclosure of Secrets and Its Applications.
Sven Laur, Helger Lipmaa
2007A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.
Bahador Bakhshi, Babak Sadeghiyan
2007An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
2007An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
Fagen Li, Yupu Hu, Chuanrong Zhang
2007An Unconditionally Secure Protocol for Multi-Party Set Intersection.
Ronghua Li, Chuankun Wu
2007Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
2007Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Jonathan Katz, Moti Yung
2007BAP: Broadcast Authentication Using Cryptographic Puzzles.
Patrick Schaller, Srdjan Capkun, David A. Basin
2007Bayesian Methods for Practical Traitor Tracing.
Philip Zigoris, Hongxia Jin
2007Certified E-Mail Protocol in the ID-Based Setting.
Chunxiang Gu, Yuefei Zhu, Yonghui Zheng
2007Compressed XTR.
Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
2007Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.
Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
2007Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
2007Efficient Certificateless Signature Schemes.
Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
2007Efficient Content Authentication in Peer-to-Peer Networks.
Roberto Tamassia, Nikos Triandopoulos
2007Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
2007Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay
2007Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen
2007Generic Transformation to Strongly Unforgeable Signatures.
Qiong Huang, Duncan S. Wong, Yiming Zhao
2007Gradually Convertible Undeniable Signatures.
Laila El Aimani, Damien Vergnaud
2007Identity-Based Proxy Re-encryption.
Matthew Green, Giuseppe Ateniese
2007Merkle Signatures with Virtually Unlimited Signature Capacity.
Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
2007Midpoints Versus Endpoints: From Protocols to Firewalls.
Diana von Bidder, David A. Basin, Germano Caronni
2007Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
2007Privacy-Preserving Set Union.
Keith B. Frikken
2007Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.
Stefan Tillich, Christoph Herbst, Stefan Mangard
2007Security Mediated Certificateless Signatures.
Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
2007Sliding Window Method for NTRU.
Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park
2007Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.
Rui Zhang
2007Universal Accumulators with Efficient Nonmembership Proofs.
Jiangtao Li, Ninghui Li, Rui Xue
2007Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.
Stanislaw Jarecki, Xiaomin Liu