ACNS B

34 papers

YearTitle / Authors
2014A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols.
Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov
2014A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai
2014Activity Spoofing and Its Defense in Android Smartphones.
Brett Cooley, Haining Wang, Angelos Stavrou
2014All-but-One Dual Projective Hashing and Its Applications.
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
2014Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
2014Automatic Protocol Selection in Secure Two-Party Computations.
Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014BackRef: Accountability in Anonymous Communication Networks.
Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel
2014Bit-Flip Faults on Elliptic Curve Base Fields, Revisited.
Taechan Kim, Mehdi Tibouchi
2014Certified Bitcoins.
Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
2014Delegating a Pairing Can Be Both Secure and Efficient.
Sébastien Canard, Julien Devigne, Olivier Sanders
2014Detecting Hidden Leakages.
Amir Moradi, Sylvain Guilley, Annelie Heuser
2014Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro.
Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
2014Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Franziskus Kiefer, Mark Manulis
2014Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials.
Sabyasachi Karati, Abhijit Das
2014Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Haya Schulmann, Michael Waidner
2014Improved Constructions of PRFs Secure Against Related-Key Attacks.
Kevin Lewi, Hart William Montgomery, Ananth Raghunathan
2014Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function.
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2014Improving Intrusion Detection Systems for Wireless Sensor Networks.
Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík
2014Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
Jia Xu, Jianying Zhou
2014Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.
Yu Sasaki
2014MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.
Zhe Liu, Erich Wenger, Johann Großschädl
2014New Modular Compilers for Authenticated Key Exchange.
Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk
2014New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents.
Yao Lu, Rui Zhang, Dongdai Lin
2014On Updatable Redactable Signatures.
Henrich Christopher Pöhls, Kai Samelin
2014On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Céline Blondeau, Andrey Bogdanov, Meiqin Wang
2014Partial Key Exposure Attacks on Takagi's Variant of RSA.
Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
2014Password-Based Authenticated Key Exchange without Centralized Trusted Setup.
Kazuki Yoneyama
2014Polymorphism as a Defense for Automated Attack of Websites.
Xinran Wang, Tadayoshi Kohno, Bob Blakley
2014Practical Signatures from the Partial Fourier Recovery Problem.
Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014Private Message Transmission Using Disjoint Paths.
Hadi Ahmadi, Reihaneh Safavi-Naini
2014Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions.
Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
2014Sakura: A Flexible Coding for Tree Hashing.
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2014Verifiable Multi-server Private Information Retrieval.
Liang Feng Zhang, Reihaneh Safavi-Naini
2014WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin