


default search action
9. SCN 2014: Amalfi, Italy
- Michel Abdalla

, Roberto De Prisco
:
Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8642, Springer 2014, ISBN 978-3-319-10878-0
Key Exchange
- Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz:

Universally Composable Non-Interactive Key Exchange. 1-20 - David Pointcheval

, Olivier Sanders:
Forward Secure Non-Interactive Key Exchange. 21-39 - Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis:

Secure Key Exchange and Sessions without Credentials. 40-56
Multilinear Maps and Obfuscation
- Omkant Pandey, Kim Ramchen, Brent Waters:

Relaxed Two-to-One Recoding Schemes. 57-76 - Antonio Marcedone, Claudio Orlandi

:
Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). 77-90
Invited Talk I
- Sanjam Garg:

Program Obfuscation via Multilinear Maps. 91-94
Pseudorandom Function Extensions
- Georg Fuchsbauer:

Constrained Verifiable Random Functions. 95-114 - Yu Chen, Zongyang Zhang:

Publicly Evaluable Pseudorandom Functions and Their Applications. 115-134
Secure Computation - Foundations and Algorithms
- Nikolaos Makriyannis

:
On the Classification of Finite Boolean Functions up to Fairness. 135-154 - Joshua Lampkins, Rafail Ostrovsky:

Communication-Efficient MPC for General Adversary Structures. 155-174 - Carsten Baum, Ivan Damgård, Claudio Orlandi

:
Publicly Auditable Secure Multi-Party Computation. 175-196 - Ashish Choudhury

, Arpita Patra, Nigel P. Smart:
Reducing the Overhead of MPC over a Large Population. 197-217
Network Security
- Daniel V. Bailey, Markus Dürmuth

, Christof Paar:
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. 218-235 - Paul Giura, Vladimir Kolesnikov, Aris Tentes, Yevgeniy Vahlis:

Efficient Network-Based Enforcement of Data Access Rights. 236-254 - Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis:

EyeDecrypt - Private Interactions in Plain Sight. 255-276
Functional Encryption
- Jie Chen, Hoeteck Wee:

Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. 277-297 - Katsuyuki Takashima:

Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption. 298-317
Invited Talk II
- Hoeteck Wee:

Functional Encryption and Its Impact on Cryptography. 318-323
Cryptanalysis
- Yu Sasaki, Lei Wang:

Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. 324-339 - Yusuke Naito, Kazuo Ohta:

Improved Indifferentiable Security Analysis of PHOTON. 340-357
Secure Computation - Implementation
- Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen

:
Faster Maliciously Secure Two-Party Computation Using the GPU. 358-379 - Jason Perry, Debayan Gupta

, Joan Feigenbaum, Rebecca N. Wright:
Systematizing Secure Computation for Research and Decision Support. 380-397 - Ivan Damgård, Rasmus Lauritsen, Tomas Toft:

An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation. 398-415
Zero Knowledge
- Helger Lipmaa:

Efficient NIZK Arguments via Parallel Verification of Benes Networks. 416-434 - Abhishek Jain, Omkant Pandey:

Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. 435-454 - Muthuramakrishnan Venkitasubramaniam:

On Adaptively Secure Protocols. 455-475
Message Authentication
- Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:

Key-Indistinguishable Message Authentication Codes. 476-493 - Yevgeniy Dodis, Dario Fiore:

Interactive Encryption and Message Authentication. 494-513
Invited Talk III
- Dario Catalano:

Homomorphic Signatures and Message Authentication Codes. 514-519
Proofs of Space and Erasure
- Nikolaos P. Karvelas, Aggelos Kiayias:

Efficient Proofs of Secure Erasure. 520-537 - Giuseppe Ateniese, Ilario Bonacina

, Antonio Faonio
, Nicola Galesi:
Proofs of Space: When Space Is of the Essence. 538-557
Public-Key Encryption
- Takashi Yamakawa, Shota Yamada, Koji Nuida

, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. 558-577 - Rafail Ostrovsky, Vanishree Rao, Ivan Visconti:

On Selective-Opening Attacks against Encryption Schemes. 578-597 - David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung:

Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption. 598-607

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














