default search action
5th ACNS 2007: Zhuhai, China
- Jonathan Katz, Moti Yung:
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings. Lecture Notes in Computer Science 4521, Springer 2007, ISBN 978-3-540-72737-8
Signature Schemes I
- Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. 1-17 - Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. 18-30 - Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume:
Merkle Signatures with Virtually Unlimited Signature Capacity. 31-45
Computer and Network Security
- Diana von Bidder, David A. Basin, Germano Caronni:
Midpoints Versus Endpoints: From Protocols to Firewalls. 46-64 - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. 65-86 - Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng:
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. 87-103
Cryptanalysis
- Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. 104-115 - Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen:
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. 116-128 - Bahador Bakhshi, Babak Sadeghiyan:
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. 129-140 - Stefan Tillich, Christoph Herbst, Stefan Mangard:
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. 141-157
Group-Oriented Security
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won:
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. 158-176 - Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu:
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. 177-193 - Philip Zigoris, Hongxia Jin:
Bayesian Methods for Practical Traitor Tracing. 194-206
Cryptographic Protocols
- Sven Laur, Helger Lipmaa:
A New Protocol for Conditional Disclosure of Secrets and Its Applications. 207-225 - Ronghua Li, Chuankun Wu:
An Unconditionally Secure Protocol for Multi-Party Set Intersection. 226-236 - Keith B. Frikken:
Privacy-Preserving Set Union. 237-252
Anonymous Authentication
- Jiangtao Li, Ninghui Li, Rui Xue:
Universal Accumulators with Efficient Nonmembership Proofs. 253-269 - Stanislaw Jarecki, Xiaomin Liu:
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. 270-287
Identity-Based Cryptography
- Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. 288-306 - Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A More Natural Way to Construct Identity-Based Identification Schemes. 307-322 - Rui Zhang:
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. 323-339 - Chunxiang Gu, Yuefei Zhu, Yonghui Zheng:
Certified E-Mail Protocol in the ID-Based Setting. 340-353
Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks
- Roberto Tamassia, Nikos Triandopoulos:
Efficient Content Authentication in Peer-to-Peer Networks. 354-372 - Fagen Li, Yupu Hu, Chuanrong Zhang:
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. 373-384 - Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay:
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. 385-400 - Patrick Schaller, Srdjan Capkun, David A. Basin:
BAP: Broadcast Authentication Using Cryptographic Puzzles. 401-419
Efficient Implementation
- Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi:
Compressed XTR. 420-431 - Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park:
Sliding Window Method for NTRU. 432-442
Signature Schemes II
- Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Certificateless Signature Schemes. 443-458 - Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. 459-477 - Laila El Aimani, Damien Vergnaud:
Gradually Convertible Undeniable Signatures. 478-496
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.