ACNS B

33 papers

YearTitle / Authors
2009A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
2009A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
2009Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.
Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo
2009An Efficient Identity-Based Online/Offline Encryption Scheme.
Joseph K. Liu, Jianying Zhou
2009Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud
2009Attacking ECDSA-Enabled RFID Devices.
Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer
2009Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.
MoonShik Lee, Daegun Ma, Minjae Seo
2009Broadcast Attacks against Lattice-Based Cryptosystems.
Thomas Plantard, Willy Susilo
2009Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte
2009Collision Attack on Boole.
Florian Mendel, Tomislav Nad, Martin Schläffer
2009Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.
Seiko Arita, Koji Tsurudome
2009Cryptanalysis of CubeHash.
Eric Brier, Thomas Peyrin
2009Cryptanalysis of Twister.
Florian Mendel, Christian Rechberger, Martin Schläffer
2009Dual-Policy Attribute Based Encryption.
Nuttapong Attrapadung, Hideki Imai
2009Efficient Deniable Authentication for Signatures.
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
2009Efficient Robust Private Set Intersection.
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
2009Fast Packet Classification Using Condition Factorization.
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
2009Fragility of the Robust Security Network: 802.11 Denial of Service.
Martin Eian
2009Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
Mark Manulis
2009Homomorphic MACs: MAC-Based Integrity for Network Coding.
Shweta Agrawal, Dan Boneh
2009How to Compare Profiled Side-Channel Attacks?.
François-Xavier Standaert, François Koeune, Werner Schindler
2009How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.
Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto
2009Integrity Protection for Revision Control.
Christian Cachin, Martin Geisler
2009Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.
Lei Liu, Songqing Chen
2009Novel Precomputation Schemes for Elliptic Curve Cryptosystems.
Patrick Longa, Catherine H. Gebotys
2009Partial Key Exposure Attack on CRT-RSA.
Santanu Sarkar, Subhamoy Maitra
2009Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.
Jörg Lenhard, Karsten Loesing, Guido Wirtz
2009Practical Secure Evaluation of Semi-private Functions.
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
2009Secure Hamming Distance Based Computation and Its Applications.
Ayman Jarrous, Benny Pinkas
2009Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.
Nitesh Saxena, Md. Borhan Uddin
2009Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.
Cas J. F. Cremers
2009Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.
Emmanuel Prouff, Matthieu Rivain
2009Tracing and Revoking Pirate Rebroadcasts.
Aggelos Kiayias, Serdar Pehlivanoglu