ProvSec C

20 papers

YearTitle / Authors
2013A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes.
Kazuhiko Minematsu
2013Anonymous Signcryption against Linear Related-Key Attacks.
Hui Cui, Yi Mu, Man Ho Au
2013Authenticated Key Exchange Protocols Based on Factoring Assumption.
Hai Huang
2013CIL Security Proof for a Password-Based Key Exchange.
Cristian Ene, Clémentine Gritti, Yassine Lakhnech
2013Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
Y. Sreenivasa Rao, Ratna Dutta
2013Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan
2013Factoring-Based Proxy Re-Encryption Schemes.
Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
2013How to Remove the Exponent GCD in HK09.
Xianhui Lu, Bao Li, Yamin Liu
2013Improved Authenticity Bound of EAX, and Refinements.
Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
2013Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.
Angsuman Das, Sabyasachi Dutta, Avishek Adhikari
2013Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges.
Ioana Boureanu, Serge Vaudenay
2013Non Observability in the Random Oracle Model.
Prabhanjan Ananth, Raghav Bhaskar
2013On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols.
Serge Vaudenay
2013Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
Willy Susilo, Reza Reyhanitabar
2013RKA Secure PKE Based on the DDH and HR Assumptions.
Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei
2013The Security of the OCB Mode of Operation without the SPRP Assumption.
Kazumaro Aoki, Kan Yasuda
2013Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu
2013Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen
2013Translation-Randomizable Distributions via Random Walks.
Nirattaya Khamsemanan, William E. Skeith III
2013k-time Proxy Signature: Formal Definition and Efficient Construction.
Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei