


default search action
14th ACNS 2016: Guildford, UK
- Mark Manulis

, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8
Authentication and Key Establishment
- Simon R. Blackburn, Matthew J. B. Robshaw:

On the Security of the Algebraic Eraser Tag Authentication Protocol. 3-17 - Stéphanie Alt, Pierre-Alain Fouque

, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. 18-35 - Ian Goldberg, Graeme Jenkinson, Frank Stajano:

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. 36-57 - Jean Lancrenon, Marjan Skrobot

, Qiang Tang:
Two More Efficient Variants of the J-PAKE Protocol. 58-76 - Megumi Ando, Joshua D. Guttman

, Alberto R. Papaleo, John Scire:
Hash-Based TPM Signatures for the Quantum World. 77-94
Signatures with Advanced Properties
- Takahiro Matsuda

, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
:
Fuzzy Signatures: Relaxing Requirements and a New Construction. 97-116 - Jonathan Bootle

, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi
, Jens Groth
:
Foundations of Fully Dynamic Group Signatures. 117-136 - Benoît Libert, Fabrice Mouhartem, Khoa Nguyen

:
A Lattice-Based Group Signature Scheme with Message-Dependent Opening. 137-155 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. 156-174 - Houda Ferradi, Rémi Géraud

, Diana Maimut
, David Naccache, David Pointcheval
:
Legally Fair Contract Signing Without Keystones. 175-190
DoS Attacks and Network Anomaly Detection
- Ryan Johnson, Mohamed Elsabagh

, Angelos Stavrou
:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. 193-211 - Xiejun Ni, Daojing He

, Sammy Chan, Farooq Ahmad:
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. 212-227
Deterministic and Functional Encryption
- Somindu C. Ramanna:

More Efficient Constructions for Inner-Product Encryption. 231-248 - Nuttapong Attrapadung

, Goichiro Hanaoka
, Tsutomu Matsumoto, Tadanori Teruya
, Shota Yamada
:
Attribute Based Encryption with Direct Efficiency Tradeoff. 249-266 - Xavier Boyen, Qinyi Li:

Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. 267-284 - Hamza Abusalah

, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. 285-303 - Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters:

Deterministic Public-Key Encryption Under Continual Leakage. 304-323
Computing on Encrypted Data
- Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:

Better Preprocessing for Secure Multiparty Computation. 327-345 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:

Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation. 346-366 - Edouard Cuvelier, Olivier Pereira:

Verifiable Multi-party Computation with Perfectly Private Audit Trail. 367-385 - Krzysztof Grining, Marek Klonowski, Piotr Syga

:
Practical Fault-Tolerant Data Aggregation. 386-404 - Angela Jäschke, Frederik Armknecht

:
Accelerating Homomorphic Computations on Rational Numbers. 405-423
Non-Interactive Proofs and PRFs
- Alonso González, Carla Ràfols

:
New Techniques for Non-interactive Shuffle and Range Arguments. 427-444 - Hamza Abusalah

, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. 445-463
Symmetric Ciphers
- Yosuke Todo

, Kazumaro Aoki:
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. 467-484 - Yunwen Liu

, Qingju Wang
, Vincent Rijmen
:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. 485-499 - Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
:
Square Attack on 7-Round Kiasu-BC. 500-517 - Kota Kondo, Yu Sasaki, Tetsu Iwata:

On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. 518-536 - Alex Biryukov

, Daniel Dinu, Johann Großschädl:
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. 537-557
Cryptography in Software
- Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque

:
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing. 561-579 - Elena Kirshanova

, Alexander May
, Friedrich Wiemer
:
Parallel Implementation of BDD Enumeration for LWE. 580-591 - Thomas Gougeon, Morgan Barbier

, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
:
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. 592-608
Security for Human Use
- Mauro Conti

, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. 611-628 - Weizhi Meng

, Wenjuan Li
, Duncan S. Wong, Jianying Zhou
:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. 629-647 - Jagmohan Chauhan, Hassan Jameel Asghar

, Anirban Mahanti, Mohamed Ali Kâafar
:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. 648-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














