default search action
15th ACNS 2017: Kanazawa, Japan
- Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4
Applied Cryptography
- Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset:
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. 3-19 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Simple Security Definitions for and Constructions of 0-RTT Key Exchange. 20-38 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. 39-58 - Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:
Secure and Efficient Pairing at 256-Bit Security Level. 59-79
Data Protection and Mobile Security
- Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. 83-102 - Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu:
Are You Lying: Validating the Time-Location of Outdoor Images. 103-123 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. 124-144 - Weizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou:
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. 145-162
Security Analysis
- Yi-Ruei Chen, Wen-Guey Tzeng:
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. 165-183 - Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini:
A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. 184-207 - Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. 208-228 - Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek:
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables. 229-249
Cryptographic Primitives
- Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. 253-272 - Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. 273-292 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. 293-312 - Ronghai Yang, Wing Cheong Lau, Shangcheng Shi:
Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols. 313-335 - David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi:
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model). 336-353 - Kaoru Kurosawa, Rie Habuka:
More Efficient Construction of Bounded KDM Secure Encryption. 354-372 - Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. 373-389
Side Channel Attack
- Claude Carlet, Annelie Heuser, Stjepan Picek:
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. 393-414 - Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. 415-434 - Alex Biryukov, Daniel Dinu, Yann Le Corre:
Side-Channel Attacks Meet Secure Network Protocols. 435-454
Cryptographic Protocol
- Dan Boneh, Sam Kim, Valeria Nikolaenko:
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. 457-477 - Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. 478-497 - Jason H. M. Ying, Noboru Kunihiro:
Bounds in Various Generalized Settings of the Discrete Logarithm Problem. 498-517 - Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low:
An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis. 518-536 - Ignacio Cascudo, Bernardo David:
SCRAPE: Scalable Randomness Attested by Public Entities. 537-556 - David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. 557-578 - Olivier Blazy, Céline Chevalier, Paul Germouty:
Almost Optimal Oblivious Transfer from QA-NIZK. 579-598 - Daniel Demmler, Marco Holz, Thomas Schneider:
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. 599-619
Data and Server Security
- Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. 623-644 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. 645-664 - John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa:
Legacy-Compliant Data Authentication for Industrial Control System Traffic. 665-685 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Multi-client Oblivious RAM Secure Against Malicious Servers. 686-707
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.