


default search action
15th ACNS 2017: Kanazawa, Japan
- Dieter Gollmann, Atsuko Miyaji

, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4
Applied Cryptography
- Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset:

Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. 3-19 - Britta Hale

, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Simple Security Definitions for and Constructions of 0-RTT Key Exchange. 20-38 - Stanislaw Jarecki

, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. 39-58 - Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:

Secure and Efficient Pairing at 256-Bit Security Level. 59-79
Data Protection and Mobile Security
- Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti

, Radha Poovendran
:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. 83-102 - Xiaopeng Li

, Wenyuan Xu, Song Wang
, Xianshan Qu:
Are You Lying: Validating the Time-Location of Outdoor Images. 103-123 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:

Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. 124-144 - Weizhi Meng

, Wenjuan Li
, Lee Wang Hao, Lijun Jiang, Jianying Zhou
:
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. 145-162
Security Analysis
- Yi-Ruei Chen, Wen-Guey Tzeng:

Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. 165-183 - Marco Cianfriglia, Stefano Guarino

, Massimo Bernaschi, Flavio Lombardi
, Marco Pedicini
:
A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. 184-207 - Ralph Ankele, Subhadeep Banik

, Avik Chakraborti, Eik List, Florian Mendel
, Siang Meng Sim
, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. 208-228 - Marcel Keller

, Emmanuela Orsini
, Dragos Rotaru, Peter Scholl
, Eduardo Soria-Vazquez
, Srinivas Vivek
:
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables. 229-249
Cryptographic Primitives
- Rui Xu, Sze Ling Yeo, Kazuhide Fukushima

, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. 253-272 - Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:

Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. 273-292 - San Ling

, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. 293-312 - Ronghai Yang, Wing Cheong Lau, Shangcheng Shi

:
Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols. 313-335 - David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi:

Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model). 336-353 - Kaoru Kurosawa, Rie Habuka:

More Efficient Construction of Bounded KDM Secure Encryption. 354-372 - Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:

Signature Schemes with Randomized Verification. 373-389
Side Channel Attack
- Claude Carlet, Annelie Heuser, Stjepan Picek:

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. 393-414 - Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:

A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. 415-434 - Alex Biryukov

, Daniel Dinu, Yann Le Corre:
Side-Channel Attacks Meet Secure Network Protocols. 435-454
Cryptographic Protocol
- Dan Boneh, Sam Kim, Valeria Nikolaenko:

Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. 457-477 - Russell W. F. Lai

, Sherman S. M. Chow
:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. 478-497 - Jason H. M. Ying, Noboru Kunihiro

:
Bounds in Various Generalized Settings of the Discrete Logarithm Problem. 498-517 - Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low:

An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis. 518-536 - Ignacio Cascudo

, Bernardo David:
SCRAPE: Scalable Randomness Attested by Public Entities. 537-556 - David Chaum, Debajyoti Das

, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter
, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. 557-578 - Olivier Blazy

, Céline Chevalier, Paul Germouty:
Almost Optimal Oblivious Transfer from QA-NIZK. 579-598 - Daniel Demmler, Marco Holz, Thomas Schneider

:
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. 599-619
Data and Server Security
- Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:

Accountable Storage. 623-644 - Matteo Maffei, Giulio Malavolta

, Manuel Reinert, Dominique Schröder
:
Maliciously Secure Multi-Client ORAM. 645-664 - John Henry Castellanos

, Daniele Antonioli, Nils Ole Tippenhauer
, Martín Ochoa
:
Legacy-Compliant Data Authentication for Industrial Control System Traffic. 665-685 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:

Multi-client Oblivious RAM Secure Against Malicious Servers. 686-707

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














