ACNS B

35 papers

YearTitle / Authors
2017A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini
2017A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Weizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou
2017A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
2017Accountable Storage.
Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
2017Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model).
David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi
2017Almost Optimal Oblivious Transfer from QA-NIZK.
Olivier Blazy, Céline Chevalier, Paul Germouty
2017An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis.
Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low
2017An Experimental Study of the BDD Approach for the Search LWE Problem.
Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen
2017Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
2017Are You Lying: Validating the Time-Location of Outdoor Images.
Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu
2017Bounds in Various Generalized Settings of the Discrete Logarithm Problem.
Jason H. M. Ying, Noboru Kunihiro
2017Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols.
Ronghai Yang, Wing Cheong Lau, Shangcheng Shi
2017Efficiently Obfuscating Re-Encryption Program Under DDH Assumption.
Akshayaram Srinivasan, Chandrasekaran Pandu Rangan
2017Faster Secure Multi-party Computation of AES and DES Using Lookup Tables.
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
2017Forward-Secure Searchable Encryption on Labeled Bipartite Graphs.
Russell W. F. Lai, Sherman S. M. Chow
2017Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security.
Yi-Ruei Chen, Wen-Guey Tzeng
2017Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes.
Dan Boneh, Sam Kim, Valeria Nikolaenko
2017Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2017Legacy-Compliant Data Authentication for Industrial Control System Traffic.
John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa
2017Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks.
Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik
2017Maliciously Secure Multi-Client ORAM.
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2017More Efficient Construction of Bounded KDM Secure Encryption.
Kaoru Kurosawa, Rie Habuka
2017Multi-client Oblivious RAM Secure Against Malicious Servers.
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2017No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran
2017OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Daniel Demmler, Marco Holz, Thomas Schneider
2017Related-Key Impossible-Differential Attack on Reduced-Round Skinny.
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
2017SCRAPE: Scalable Randomness Attested by Public Entities.
Ignacio Cascudo, Bernardo David
2017Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset
2017Secure and Efficient Pairing at 256-Bit Security Level.
Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi
2017Side-Channel Attacks Meet Secure Network Protocols.
Alex Biryukov, Daniel Dinu, Yann Le Corre
2017Signature Schemes with Randomized Verification.
Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters
2017Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
2017TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2017Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Claude Carlet, Annelie Heuser, Stjepan Picek
2017cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman