ACNS B

36 papers

YearTitle / Authors
2016A Cryptographic Analysis of UMTS/LTE AKA.
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard
2016A Lattice-Based Group Signature Scheme with Message-Dependent Opening.
Benoît Libert, Fabrice Mouhartem, Khoa Nguyen
2016Accelerating Homomorphic Computations on Rational Numbers.
Angela Jäschke, Frederik Armknecht
2016Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider
2016Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing.
Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
2016Attribute Based Encryption with Direct Efficiency Tradeoff.
Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada
2016Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey.
Yunwen Liu, Qingju Wang, Vincent Rijmen
2016Better Preprocessing for Secure Multiparty Computation.
Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
2016CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Mauro Conti, Claudio Guarisco, Riccardo Spolaor
2016Constrained PRFs for Unbounded Inputs with Short Keys.
Hamza Abusalah, Georg Fuchsbauer
2016Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Alex Biryukov, Daniel Dinu, Johann Großschädl
2016Deterministic Public-Key Encryption Under Continual Leakage.
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
2016Foundations of Fully Dynamic Group Signatures.
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2016Fuzzy Signatures: Relaxing Requirements and a New Construction.
Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
2016Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar
2016Hash-Based TPM Signatures for the Quantum World.
Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire
2016Legally Fair Contract Signing Without Keystones.
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
2016Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
Ian Goldberg, Graeme Jenkinson, Frank Stajano
2016Memory Carving in Embedded Devices: Separate the Wheat from the Chaff.
Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
2016More Efficient Constructions for Inner-Product Encryption.
Somindu C. Ramanna
2016Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad
2016New Techniques for Non-interactive Shuffle and Range Arguments.
Alonso González, Carla Ràfols
2016Offline Witness Encryption.
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2016On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants.
Kota Kondo, Yu Sasaki, Tetsu Iwata
2016On the Security of the Algebraic Eraser Tag Authentication Protocol.
Simon R. Blackburn, Matthew J. B. Robshaw
2016Parallel Implementation of BDD Enumeration for LWE.
Elena Kirshanova, Alexander May, Friedrich Wiemer
2016Practical Fault-Tolerant Data Aggregation.
Krzysztof Grining, Marek Klonowski, Piotr Syga
2016Square Attack on 7-Round Kiasu-BC.
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou
2016Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security.
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation.
Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
2016Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Xavier Boyen, Qinyi Li
2016Two More Efficient Variants of the J-PAKE Protocol.
Jean Lancrenon, Marjan Skrobot, Qiang Tang
2016Verifiable Multi-party Computation with Perfectly Private Audit Trail.
Edouard Cuvelier, Olivier Pereira
2016Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms.
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
2016Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Yosuke Todo, Kazumaro Aoki