International Conference on
Applied Cryptography and Network Security

List of Most Cited Papers * (2003 - 2013)

2003 [4/32]

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park
Differential Fault Analysis on AES
Pierre Dusart, Gilles Letourneux, Olivier Vivolo  **
Side-Channel Attack on Substitution Blocks
Roman Novak
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
2004 [11/36]

Secure Conjunctive Keyword Search over Encrypted Data
Philippe Golle, Jessica Staddon, Brent Waters  **
Evaluating Security of Voting Schemes in the Universal Composability Framework
Jens Groth
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
S-RIP: A Secure Distance Vector Routing Protocol
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
One-Round Protocols for Two-Party Authenticated Key Exchange
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee  **
Key Agreement Using Statically Keyed Authenticators
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
Low-Latency Cryptographic Protection for SCADA Communications
Andrew K. Wright, John A. Kinast, Joe McCarty
SQLrand: Preventing SQL Injection Attacks
Stephen W. Boyd, Angelos D. Keromytis  **
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
Bok-Min Goi, Raphael C.-W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M.U. Siddiqi
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
Shuhong Wang, Jie Wang, Maozhi Xu

A Novel Framework for Alert Correlation and Understanding
Dong Yu, Deborah Frincke
2005 [19/35]

Two-Server Password-Only Authenticated Key Exchange
 Jonathan Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
Raphael C.-W. Phan, Bok-Min Goi

A Traitor Tracing Scheme Based on RSA for Fast Decryption
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun, Dong Hoon Lee
Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records
Virgil Griffith, Markus Jakobsson
Thompson’s Group and Public Key Cryptography
Vladimir Shpilrain, Alexander Ushakov
Rainbow, a New Multivariable Polynomial Signature Scheme
Jintai Ding, Dieter Schmidt  **
Indexing Information for Data Forensics
Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
Identity Based Encryption Without Redundancy
Benoıt Libert, Jean-Jacques Quisquater
OACerts: Oblivious Attribute Certificates
Jiangtao Li, Ninghui Li
Dynamic k-Times Anonymous Authentication
Lan Nguyen, Rei Safavi-Naini  **
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
Flavio D. Garcia, Jaap-Henk Hoepman
Robust Key Extraction from Physical Uncloneable Functions
B. Skoric, P. Tuyls, W. Ophey  **
Efficient Constructions for One-Way Hash Chains
Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Michael Mitzenmacher  **
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
Hsiao-Ying Lin, Wen-Guey Tzeng  **
Non-interactive Zero-Knowledge Arguments for Voting
Jens Groth
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Rui Zhang, Jun Furukawa, Hideki Imai
Efficient Identity Based Ring Signature
Sherman S.M. Chow, Siu-Ming Yiu, Lucas C.K. Hui  **
2006 [4/33]

A Handy Multi-coupon System Sebastien Canard, Aline Gouget, Emeline Hufschmitt
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
An AES Smart Card Implementation Resistant to Power Analysis Attacks
Christoph Herbst, Elisabeth Oswald, Stefan Mangard  **
Certificateless Public-Key Signature: Security Model and Efficient Construction
Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng  **
2007 [12/31]

Generic Transformation to Strongly Unforgeable Signatures
Qiong Huang, Duncan S. Wong, Yiming Zhao
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
Merkle Signatures with Virtually Unlimited Signature Capacity
Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis Stefan Tillich, Christoph Herbst, Stefan Mangard
Privacy-Preserving Set Union
Keith Frikken
Universal Accumulators with Efficient Nonmembership Proofs
Jiangtao Li, Ninghui Li, Rui Xue
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Stanislaw Jarecki, Xiaomin Liu
Identity-Based Proxy Re-encryption
Matthew Green, Giuseppe Ateniese  **
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
Fagen Li, Yupu Hu, Chuanrong Zhang
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay
Efficient Certificateless Signature Schemes
Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee  **
Security Mediated Certificateless Signatures
Wun-She Yap, Sherman S.M. Chow, Swee-Huay Heng, Bok-Min Goi
2008 [9/30]

Traceable and Retrievable Identity-Based Encryption
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta  **
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
Multi-factor Authenticated Key Exchange
David Pointcheval, Sebastien Zimmer
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Ramnath Prasad, Nitesh Saxena
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
Ghaith Hammouri, Berk Sunar
A Very Compact “Perfectly Masked” S-Box for AES
D. Canright, Lejla Batina  **
Traceable Privacy of Recent Provably-Secure RFID Protocols
Khaled Ouafi, Raphael C.-W. Phan
The Security of EPC Gen2 Compliant RFID Protocols
Mike Burmester, Breno de Medeiros
2009 [9/32]

Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Cas J.F. Cremers
Practical Secure Evaluation of Semi-private Functions Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
Secure Hamming Distance Based Computation and Its Applications
Ayman Jarrous, Benny Pinkas
Efficient Robust Private Set Intersection
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung  **
An Efficient Identity-Based Online/Offline Encryption Scheme Joseph K. Liu, Jianying Zhou
Homomorphic MACs: MAC-Based Integrity for Network Coding
Shweta Agrawal, Dan Boneh  **
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte
How to Compare Profiled Side-Channel Attacks?
Francois-Xavier Standaert, Francois Koeune, Werner Schindler
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Emmanuel Prouff, Matthieu Rivain
2010 [5/32]

Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Christina Brzuska, Heike Busch, Oezguer Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schroder
Batch Groth–Sahai
Olivier Blazy, Georg Fuchsbauer, Malika Izabachene, Amandine Jambert, Herve Sibert, Damien Vergnaud
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Rosario Gennaro, Hugo Krawczyk, Tal Rabin
Deniable Internet Key Exchange Andrew C. Yao, Yunlei Zhao
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi Sandhu
2011 [3/31]

Inferring Protocol State Machine from Network Traces: A Probabilistic Approach Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
LBlock: A Lightweight Block Cipher
Wenling Wu, Lei Zhang  **
Public-Key Encryption with Delegated Search Luan Ibraimi, Svetla Nikova, Pieter Hartel, Willem Jonker
2012 [6/33]

TreVisor: OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks
Tilo Muller, Benjamin Taubmann, Felix C. Freiling
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
Gilles Piret, Thomas Roche, Claude Carlet
Detecting Social Spam Campaigns on Twitter
Zi Chu, Indra Widjaja, Haining Wang
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
Boyang Wang, Baochun Li, Hui Li  **
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment Sherman S.M. Chow, Yi-Jun He, Lucas C.K. Hui, Siu Ming Yiu  **
Private Computation of Spatial and Temporal Power Consumption with Smart Meters
Zekeriya Erkin, Gene Tsudik
2013 [8/35]

Transparent, Distributed, and Replicated Dynamic Provable Data Possession Mohammad Etemad, Alptekin Küpçü
Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
BLAKE2: Simpler, Smaller, Fast as MD5
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
Experimental Analysis of Attacks on Next Generation Air Traffic Communication
Matthias Schäfer, Vincent Lenders, Ivan Martinovic
Fast and Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Jesper Buus Nielsen
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
FROST: Forensic Recovery of Scrambled Telephones Tilo Müller, Michael Spreitzenbarth
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagórski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2014 [?/33]

2015 [?/33]

2015 [?/35]

* If any ACNS paper with more than 30 Google citations is missing in the list, please let us know.
** Number of citations is above 100.

Maintained by Jianying Zhou
Last updated in December 2016