default search action
13th ACNS 2015: New York, NY, USA
- Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis:
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9092, Springer 2015, ISBN 978-3-319-28165-0
Secure Computation I: Primitives and New Models
- Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 3-22 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 23-41 - Jing Xu, Xuexian Hu, Zhenfeng Zhang:
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. 42-61
Public Key Cryptographic Primitives
- Olivier Blazy, Céline Chevalier:
Generic Construction of UC-Secure Oblivious Transfer. 65-86 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability Under Selective Opening Attacks: Implication and Separation. 87-104 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
A Signature Scheme with a Fuzzy Private Key. 105-126 - Zhen Liu, Duncan S. Wong:
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. 127-146
Secure Computation II: Applications
- Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. 149-171 - Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access with HE-over-ORAM Architecture. 172-191 - Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama:
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. 192-214 - Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang:
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. 215-239
Anonymity and Related Applications
- Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. 243-262 - Satrajit Ghosh, Aniket Kate:
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). 263-286 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. 287-306 - Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven:
Recovering Lost Device-Bound Credentials. 307-327
Cryptanalysis and Attacks (Symmetric Crypto)
- Aleksandar Kircanski:
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA. 331-349 - Jiqiang Lu, Zhen Li, Matt Henricksen:
Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). 350-369 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 370-385
Privacy and Policy Enforcement
- Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies Without Public Information. 389-408 - Florian Kelbert, Alexander Pretschner:
A Fully Decentralized Data Usage Control Enforcement Infrastructure. 409-430 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 431-453
Authentication via Eye Tracking and Proofs of Proximity
- Dachuan Liu, Bo Dong, Xing Gao, Haining Wang:
Exploiting Eye Tracking for Smartphone Authentication. 457-477 - Handan Kilinç, Serge Vaudenay:
Optimal Proximity Proofs Revisited. 478-494
Malware Analysis and Side Channel Attacks
- Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. 497-517 - Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. 518-537 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Differential Power Analysis of a McEliece Cryptosystem. 538-556
Side Channel Countermeasures and Tamper Resistance/PUFs
- Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 559-578 - Jonas Schneider, Dominique Schröder:
Foundations of Reconfigurable PUFs. 579-594 - Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott:
mrPUF: A Novel Memristive Device Based Physical Unclonable Function. 595-615
Leakage Resilience and Pseudorandomness
- Bart Mennink, Bart Preneel:
On the XOR of Multiple Random Permutations. 619-634 - Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. 635-654 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 655-674 - Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. 675-695
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.