ACNS B

37 papers

YearTitle / Authors
20183PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval.
Stanislaw Jarecki, Boyang Wei
2018A Cryptographic Analysis of the WireGuard Protocol.
Benjamin Dowling, Kenneth G. Paterson
2018Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices.
Xavier Boyen, Qinyi Li
2018Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
Bart Preneel, Frederik Vercauteren
2018Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik
2018Best of Both Worlds in Secure Computation, with Low Communication Overhead.
Daniel Genkin, S. Dov Gordon, Samuel Ranellucci
2018Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks.
Serge Vaudenay, Damian Vizár
2018Continuously Non-malleable Codes with Split-State Refresh.
Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
2018Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.
Johannes Blömer, Jan Bobolz
2018Differential Cryptanalysis of Round-Reduced Sparx-64/128.
Ralph Ankele, Eik List
2018Distributed SSH Key Management with Proactive RSA Threshold Signatures.
Yotam Harchol, Ittai Abraham, Benny Pinkas
2018DogFish: Decentralized Optimistic Game-theoretic FIle SHaring.
Seny Kamara, Alptekin Küpçü
2018Drive-By Key-Extraction Cache Attacks from Portable Code.
Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
2018Efficient Unconditionally Secure Signatures Using Universal Hashing.
Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
2018Floppy-Sized Group Signatures from Lattices.
Cecilia Boschini, Jan Camenisch, Gregory Neven
2018Formal Analysis of Distance Bounding with Secure Hardware.
Handan Kilinç, Serge Vaudenay
2018Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations.
Jean-Sébastien Coron
2018Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains.
F. Betül Durak, Serge Vaudenay
2018Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext.
Jiangtao Li, Junqing Gong
2018In-Region Authentication.
Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini
2018Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
Marc Fischlin, Patrick Harasser
2018KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Ivan Oliveira Nunes, Gene Tsudik
2018KangarooTwelve: Fast Hashing Based on Keccak-p.
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2018MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth.
Ralph Ankele, Florian Böhl, Simon Friedberger
2018Message-Locked Encryption with File Update.
Suyash Kandele, Souradyuti Paul
2018Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification.
Peter Sebastian Nordholt, Meilof Veeningen
2018New Protocols for Secure Equality Test and Comparison.
Geoffroy Couteau
2018Non-interactive Zaps of Knowledge.
Georg Fuchsbauer, Michele Orrù
2018Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
2018On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography.
Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
2018On the Security Notions for Homomorphic Signatures.
Dario Catalano, Dario Fiore, Luca Nizzardo
2018Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs.
Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
2018Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption.
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
2018Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher.
Yu Sasaki
2018Stateful Multi-client Verifiable Computation.
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
2018Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation.
Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena