2003
[4/32]
|
|
Does
It Need Trusted Third Party? Design of
Buyer-Seller Watermarking Protocol without Trusted Third Party
|
Jae-Gwi Choi, Kouichi
Sakurai, Ji-Hwan Park
|
Differential
Fault Analysis on AES
|
Pierre Dusart, Gilles
Letourneux, Olivier Vivolo **
|
Side-Channel
Attack on Substitution Blocks
|
Roman
Novak |
An
Efficient Tree-Based Group Key Agreement Using Bilinear Map
|
Sangwon
Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
|
2004
[11/36]
|
|
Secure
Conjunctive Keyword Search over Encrypted Data
|
Philippe Golle, Jessica Staddon,
Brent Waters **
|
Evaluating
Security of Voting Schemes in the Universal Composability Framework
|
Jens
Groth
|
Verifiable
Shuffles: A Formal Model and a Paillier-Based Efficient Construction
with Provable Security
|
Lan
Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
|
S-RIP:
A Secure Distance Vector Routing Protocol
|
Tao
Wan, Evangelos Kranakis, Paul C. van
Oorschot
|
One-Round
Protocols for Two-Party Authenticated Key Exchange
|
Ik
Rae Jeong, Jonathan Katz,
Dong Hoon Lee
|
Key
Agreement Using Statically Keyed Authenticators
|
Colin
Boyd, Wenbo Mao, Kenneth G. Paterson
|
Low-Latency
Cryptographic Protection for SCADA Communications
|
Andrew
K. Wright, John A. Kinast, Joe McCarty
|
SQLrand:
Preventing SQL Injection Attacks
|
Stephen W. Boyd, Angelos D.
Keromytis **
|
Cryptanalysis
of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement
for True Anonymity
|
Bok-Min
Goi, Raphael C.-W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M.U.
Siddiqi
|
Weaknesses
of a Password-Authenticated Key Exchange Protocol between Clients with
Different Passwords
|
Shuhong
Wang, Jie Wang, Maozhi Xu
|
A
Novel Framework for Alert Correlation and Understanding
|
Dong
Yu, Deborah Frincke
|
2005
[16/35]
|
|
Two-Server
Password-Only Authenticated Key Exchange
|
Jonathan
Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor
|
Cryptanalysis of an
Improved Client-to-Client Password-Authenticated Key Exchange
(C2C-PAKE) Scheme
|
Raphael C.-W. Phan,
Bok-Min Goi
|
N-Party
Encrypted Diffie-Hellman Key Exchange Using Different Passwords
|
Jin
Wook Byun, Dong Hoon Lee
|
Messin’
with Texas Deriving Mother’s Maiden Names Using Public Records
|
Virgil
Griffith, Markus Jakobsson
|
Thompson’s
Group and Public Key Cryptography
|
Vladimir
Shpilrain, Alexander Ushakov
|
Rainbow,
a New Multivariable Polynomial Signature Scheme
|
Jintai
Ding, Dieter Schmidt **
|
Indexing
Information for Data Forensics
|
Michael
T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
|
OACerts:
Oblivious Attribute Certificates
|
Jiangtao
Li, Ninghui Li
|
Dynamic
k-Times Anonymous Authentication
|
Lan
Nguyen, Rei Safavi-Naini
|
Robust
Key Extraction from Physical Uncloneable Functions
|
B.
Skoric, P. Tuyls, W. Ophey
|
Efficient
Constructions for One-Way Hash Chains
|
Yih-Chun
Hu, Markus Jakobsson, Adrian Perrig
|
Privacy
Preserving Keyword Searches on Remote Encrypted Data
|
Yan-Cheng Chang,
Michael Mitzenmacher ***
|
An
Efficient Solution to the Millionaires’ Problem Based on Homomorphic
Encryption
|
Hsiao-Ying
Lin, Wen-Guey Tzeng
|
Non-interactive
Zero-Knowledge Arguments for Voting
|
Jens
Groth
|
Short
Signature and Universal Designated Verifier Signature Without Random
Oracles
|
Rui
Zhang, Jun Furukawa, Hideki Imai
|
Efficient
Identity Based Ring Signature
|
Sherman
S.M. Chow, Siu-Ming Yiu, Lucas C.K. Hui
|
2006
[4/33]
|
|
A
Handy Multi-coupon System |
Sebastien
Canard, Aline Gouget, Emeline Hufschmitt
|
Misusing
Unstructured P2P Systems to Perform DoS Attacks: The Network That Never
Forgets
|
Elias Athanasopoulos,
Kostas G. Anagnostakis, Evangelos P. Markatos |
An
AES Smart Card Implementation Resistant to Power Analysis Attacks
|
Christoph
Herbst, Elisabeth Oswald, Stefan Mangard **
|
Certificateless
Public-Key Signature: Security Model and Efficient Construction
|
Zhenfeng
Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng **
|
2007
[10/31]
|
|
Generic
Transformation to Strongly Unforgeable Signatures
|
Qiong
Huang, Duncan S. Wong, Yiming Zhao
|
Efficient
Generic On-Line/Off-Line Signatures Without Key Exposure
|
Xiaofeng
Chen, Fangguo Zhang, Willy Susilo, Yi Mu
|
Merkle
Signatures with Virtually Unlimited Signature Capacity
|
Johannes
Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille
Vuillaume
|
Protecting
AES Software Implementations on 32-Bit Processors Against Power Analysis |
Stefan
Tillich, Christoph Herbst, Stefan Mangard |
Privacy-Preserving
Set Union
|
Keith
Frikken |
Universal
Accumulators with Efficient Nonmembership Proofs
|
Jiangtao
Li, Ninghui Li, Rui Xue
|
Unlinkable
Secret Handshakes and Key-Private Group Key Management Schemes |
Stanislaw
Jarecki, Xiaomin Liu |
Identity-Based
Proxy Re-encryption
|
Matthew
Green, Giuseppe Ateniese **
|
Efficient
Self-healing Key Distribution with Revocation for Wireless Sensor
Networks Using One Way Key Chains
|
Ratna
Dutta, Ee-Chien Chang, Sourav Mukhopadhyay
|
Efficient
Certificateless Signature Schemes
|
Kyu
Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
|
2008 [8/30]
|
|
Attribute-Based
Encryption with Partially Hidden Encryptor-Specified Access Structures
|
Takashi
Nishide, Kazuki Yoneyama, Kazuo Ohta **
|
New
Differential-Algebraic Attacks and Reparametrization of Rainbow
|
Jintai
Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
|
Multi-factor
Authenticated Key Exchange
|
David
Pointcheval, Sebastien Zimmer |
Efficient
Device Pairing Using "Human-Comparable" Synchronized Audiovisual
Patterns
|
Ramnath
Prasad, Nitesh Saxena
|
PUF-HB:
A Tamper-Resilient HB Based Authentication Protocol
|
Ghaith
Hammouri, Berk Sunar
|
A
Very Compact “Perfectly Masked” S-Box for AES
|
D.
Canright, Lejla Batina
|
Traceable
Privacy of Recent Provably-Secure RFID Protocols
|
Khaled
Ouafi, Raphael C.-W. Phan
|
The
Security of EPC Gen2 Compliant RFID Protocols
|
Mike
Burmester, Breno de Medeiros
|
2009 [9/32]
|
|
Session-state
Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS
Authenticated Key Exchange Protocol
|
Cas
J.F. Cremers
|
Practical
Secure Evaluation of Semi-private Functions |
Annika
Paus, Ahmad-Reza Sadeghi, Thomas Schneider
|
Secure
Hamming Distance Based Computation and Its Applications
|
Ayman Jarrous, Benny
Pinkas
|
Efficient
Robust Private Set Intersection
|
Dana
Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
|
An
Efficient Identity-Based Online/Offline Encryption Scheme |
Joseph
K. Liu, Jianying Zhou |
Homomorphic
MACs: MAC-Based Integrity for Network Coding
|
Shweta
Agrawal, Dan Boneh **
|
Choosing
NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM
Approaches
|
Philip
S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte |
How
to Compare Profiled Side-Channel Attacks?
|
Francois-Xavier
Standaert, Francois Koeune, Werner Schindler
|
Theoretical
and Practical Aspects of Mutual Information Based Side Channel Analysis
|
Emmanuel
Prouff, Matthieu
Rivain
|
2010 [4/32]
|
|
Redactable
Signatures for Tree-Structured Data: Definitions and Constructions
|
Christina
Brzuska, Heike Busch, Oezguer Dagdelen, Marc Fischlin, Martin Franz,
Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter,
Bertram Poettering, Dominique Schroder
|
Batch
Groth–Sahai
|
Olivier
Blazy, Georg Fuchsbauer, Malika Izabachene, Amandine Jambert, Herve
Sibert, Damien Vergnaud
|
Okamoto-Tanaka
Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
|
Rosario
Gennaro, Hugo Krawczyk, Tal Rabin |
Social
Network-Based Botnet Command-and-Control: Emerging Threats and
Countermeasures |
Erhan
J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi Sandhu
|
2011 [4/31]
|
|
Inferring Protocol
State Machine from Network Traces: A Probabilistic Approach |
Yipeng Wang, Zhibin
Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
|
Private
Discovery of Common Social Contacts |
Emiliano
De Cristofaro, Mark Manulis, Bertram
Poettering |
LBlock:
A Lightweight Block Cipher
|
Wenling
Wu, Lei Zhang **
|
Public-Key
Encryption with Delegated Search |
Luan
Ibraimi, Svetla Nikova, Pieter Hartel, Willem Jonker |
2012 [6/33]
|
|
PICARO
– A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
|
Gilles
Piret, Thomas Roche, Claude Carlet
|
Detecting
Social Spam Campaigns on Twitter
|
Zi
Chu, Indra Widjaja, Haining Wang
|
Knox:
Privacy-Preserving Auditing for Shared Data with Large Groups in the
Cloud
|
Boyang
Wang, Baochun Li, Hui Li **
|
SPICE
– Simple Privacy-Preserving Identity-Management for Cloud Environment |
Sherman
S.M. Chow, Yi-Jun He, Lucas C.K. Hui, Siu Ming Yiu
|
A
Practical Smart Metering System Supporting Privacy Preserving Billing
and Load Monitoring |
Hsiao-Ying
Lin,
Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh P. Lin |
Private
Computation of Spatial and Temporal Power Consumption with Smart Meters
|
Zekeriya
Erkin, Gene Tsudik
|
2013 [9/35]
|
|
Transparent,
Distributed, and Replicated Dynamic Provable Data Possession |
Mohammad
Etemad, Alptekin Küpçü
|
From
Oblivious AES to Efficient and Secure Database Join in the
Multiparty Setting |
Sven
Laur, Riivo Talviste, Jan Willemson |
Private
Database Queries Using Somewhat Homomorphic Encryption |
Dan
Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
|
BLAKE2:
Simpler, Smaller, Fast as MD5
|
Jean-Philippe
Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
|
Experimental
Analysis of Attacks on Next Generation Air Traffic Communication
|
Matthias
Schäfer, Vincent Lenders, Ivan Martinovic
|
Fast
and Maliciously Secure Two-Party Computation Using the GPU |
Tore
Kasper Frederiksen, Jesper Buus Nielsen
|
Comparing
the Pairing Efficiency over Composite-Order and Prime-Order Elliptic
Curves
|
Aurore
Guillevic
|
FROST:
Forensic Recovery of Scrambled Telephones |
Tilo
Müller, Michael Spreitzenbarth
|
Remotegrity:
Design and Use of an End-to-End Verifiable Remote Voting System
|
Filip
Zagórski, Richard T. Carback, David Chaum, Jeremy Clark,
Aleksander Essex, Poorvi L. Vora
|