ACNS B

34 papers

YearTitle / Authors
2015A Fully Decentralized Data Usage Control Enforcement Infrastructure.
Florian Kelbert, Alexander Pretschner
2015A Signature Scheme with a Fuzzy Private Key.
Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
2015Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
2015Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA.
Aleksandar Kircanski
2015Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis
2015Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
Tobias Schneider, Amir Moradi, Tim Güneysu
2015Communication-Optimal Proactive Secret Sharing for Dynamic Groups.
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2015Cryptographic Enforcement of Information Flow Policies Without Public Information.
Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering
2015Differential Power Analysis of a McEliece Cryptosystem.
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher.
Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe
2015Exploiting Eye Tracking for Smartphone Authentication.
Dachuan Liu, Bo Dong, Xing Gao, Haining Wang
2015Foundations of Reconfigurable PUFs.
Jonas Schneider, Dominique Schröder
2015Generic Construction of UC-Secure Oblivious Transfer.
Olivier Blazy, Céline Chevalier
2015Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice.
Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data.
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
2015Non-malleability Under Selective Opening Attacks: Implication and Separation.
Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
2015Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015On the XOR of Multiple Random Permutations.
Bart Mennink, Bart Preneel
2015Optimal Proximity Proofs Revisited.
Handan Kilinç, Serge Vaudenay
2015Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Atsushi Takayasu, Noboru Kunihiro
2015Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Satrajit Ghosh, Aniket Kate
2015Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe.
Zhen Liu, Duncan S. Wong
2015Private Database Access with HE-over-ORAM Architecture.
Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova
2015Recovering Lost Device-Bound Credentials.
Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
2015Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao
2015Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
2015Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model.
Jing Xu, Xuexian Hu, Zhenfeng Zhang
2015Scalable Divisible E-cash.
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2015Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2015Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract).
Jiqiang Lu, Zhen Li, Matt Henricksen
2015Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems.
Berry Schoenmakers, Meilof Veeningen
2015Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
2015Zero-Knowledge Authenticated Order Queries and Order Statistics on a List.
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2015mrPUF: A Novel Memristive Device Based Physical Unclonable Function.
Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott