ACNS B

36 papers

YearTitle / Authors
2013Analysis and Improvement of Lindell's UC-Secure Commitment Schemes.
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini
2013Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware.
Alexander Wild, Tim Güneysu, Amir Moradi
2013BLAKE2: Simpler, Smaller, Fast as MD5.
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013Batch Proofs of Partial Knowledge.
Ryan Henry, Ian Goldberg
2013Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors.
Michael Henson, Stephen Taylor
2013Client-Controlled Cryptography-as-a-Service in the Cloud.
Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
2013CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
2013Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves.
Aurore Guillevic
2013Computing on Authenticated Data for Adjustable Predicates.
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
2013Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
2013CrowdShare: Secure Mobile Resource Sharing.
N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
2013Cryptophia's Short Combiner for Collision-Resistant Hash Functions.
Arno Mittelbach
2013Efficient Signatures of Knowledge and DAA in the Standard Model.
David Bernhard, Georg Fuchsbauer, Essam Ghadafi
2013Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Matthias Schäfer, Vincent Lenders, Ivan Martinovic
2013Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
Koutarou Suzuki, Kazuki Yoneyama
2013FROST - Forensic Recovery of Scrambled Telephones.
Tilo Müller, Michael Spreitzenbarth
2013Fast and Maliciously Secure Two-Party Computation Using the GPU.
Tore Kasper Frederiksen, Jesper Buus Nielsen
2013From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting.
Sven Laur, Riivo Talviste, Jan Willemson
2013Generic Attacks for the Xor of k Random Permutations.
Jacques Patarin
2013Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography.
Erich Wenger
2013How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE.
Rikke Bendlin, Sara Krehbiel, Chris Peikert
2013Keystroke Timing Analysis of on-the-fly Web Apps.
Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang
2013Launching Generic Attacks on iOS with Approved Third-Party Applications.
Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou
2013Leakage Resilient IBE and IPE under the DLIN Assumption.
Kaoru Kurosawa, Le Trieu Phong
2013NEON Implementation of an Attribute-Based Encryption Scheme.
Ana Helena Sánchez, Francisco Rodríguez-Henríquez
2013Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist.
Yu Sasaki
2013Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-.
Sonia Bogos, Ioana Boureanu, Serge Vaudenay
2013Private Database Queries Using Somewhat Homomorphic Encryption.
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
2013Public Key Exchange Using Semidirect Product of (Semi)Groups.
Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System.
Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2013Sequential Aggregate Signatures Made Shorter.
Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Marc Fischlin, Cristina Onete
2013Toward Practical Group Encryption.
Laila El Aimani, Marc Joye
2013Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
2013Transparent, Distributed, and Replicated Dynamic Provable Data Possession.
Mohammad Etemad, Alptekin Küpçü