|
ACNS
International Conference on
Applied Cryptography and Network Security
|
|
List of Accepted Papers (2003 | 2004
| 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020)
Multi-party Computation from Any
Linear Secret Sharing Scheme Unconditionally Secure against Adaptive
Adversary: The Zero-Error Case
Ventzislav Nikov,
Svetla Nikova, Bart Preneel
Optimized
χ2-Attack against RC6
Norihisa Isogai,
Takashi Matsunaka, Atsuko Miyaji
Anonymity-Enhanced Pseudonym System
Yuko Tamura,
Atsuko Miyaji
Using Feedback to Improve
Masquerade Detection *
Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion
Detection of Web-Based Internet Services
Zhi Guo, Kwok-Yan
Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM
Fan Min, Jun-yan
Zhang, Guo-wie Yang
Improved Scalable Hash Chain Traversal
Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem
Based on Discrete Logarithm Problem
Rui Zhang, Hideki
Imai
On the Security of Two Threshold Signature Schemes with Traceable
Signers
Guilin Wang,
Xiaoxi Han, Bo Zhu
Proxy and Threshold One-Time Signatures
Mohamed
Al-Ibrahim, Anton Cerny
A Threshold GQ Signature Scheme
Li-Shan Liu,
Cheng-Kang Chu, Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed
Adversary
Gene Itkis, Peng
Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
Chong-zhi Gao,
Zheng-an Yao, Lei Li
Modelling and Evaluating Trust Relationships in Mobile Agents Based
Systems
Ching Lin, Vijay
Varadharajan
An Authorization Model for E-consent Requirement in a Health Care
Application
Chun Ruan, Vijay
Varadharajan
PLI: A New Framework to Protect Digital Content for P2P Networks
Guofei Gu, Bin B.
Zhu, Shipeng Li, Shiyong Zhang
Improved Algebraic Traitor Tracing Scheme
Chunyan Bai,
Guiliang Feng
Common Vulnerability Markup Language
Haitao Tian,
Liusheng Huang, Zhi Zhou, Hui Zhang
Trust on Web Browser: Attack vs. Defense
Tie-Yan Li,
Yongdong Wu
Security Protocols for Biometrics-Based Cardholder Authentication in
Smartcards
Luciano Rila,
Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking
Protocol without Trusted Third Party
Jae-Gwi Choi,
Kouichi Sakurai, Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce
Jose L. Munoz,
Jordi Forne, Oscar Esparza, Bernabe Miguel Soriano
Differential Fault Analysis on AES
Pierre Dusart,
Gilles Letourneux, Olivier Vivolo
Side-Channel Attack on Substitution Blocks
Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for
Modular Exponentiation
Yasuyuki Sakai,
Kouichi Sakurai
A Fast Correlation Attack for LFSR-Based Stream Ciphers
Sarbani Palit,
Bimal K. Roy, Arindom De
Making the Key Agreement Protocol in Mobile Ad Hoc Network More
Efficient
Gang Yao, Kui
Ren, Feng Bao, Robert H. Deng, Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Sangwon Lee,
Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management
Taenam Cho,
Sang-Ho Lee
Efficient Software Implementation of LFSR and Boolean Function and Its
Application in Nonlinear Combiner Model
Sandeepan
Chowdhury, Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption
DongJin Kwak,
SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded
RISC Processors
Johann
Großschadl, Guy-Armand Kamendje
CamouflageFS:
Increasing the Effective Key Length in Cryptographic Filesystems on the
Cheap
Michael E.
Locasto, Angelos D. Keromytis
Private Keyword-Based Push and Pull with Applications to Anonymous
Communication
Lea Kissner,
Alina Oprea, Michael K. Reiter, Dawn Song, Ke Yang
Secure Conjunctive Keyword Search over Encrypted Data
Philippe Golle,
Jessica Staddon, Brent Waters
Evaluating Security of Voting
Schemes in the Universal Composability Framework *
Jens Groth
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient
Construction with Provable Security
Lan Nguyen, Rei
Safavi-Naini, Kaoru Kurosawa
On the Security of Cryptosystems with All-or-Nothing Transform
Rui Zhang,
Goichiro Hanaoka, Hideki Imai
Centralized Management of Virtual Security Zones in IP Networks
Antti Peltonen,
Teemupekka Virtanen, Esa Turtiainen
S-RIP: A Secure Distance Vector Routing Protocol
Tao Wan,
Evangelos Kranakis, Paul C. van Oorschot
A Pay-per-Use DoS Protection Mechanism for the Web
Angelos Stavrou,
John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
Limited Verifier Signature from Bilinear Pairings
Xiaofeng Chen,
Fangguo Zhang, Kwangjo Kim
Deniable Ring Authentication Revisited
Willy Susilo, Yi
Mu
A Fully-Functional Group Signature Scheme over Only Known-Order Group
Atsuko Miyaji,
Kozue Umeda
Some Observations on Zap and Its Applications
Yunlei Zhao, C.H.
Lee, Yiming Zhao, Hong Zhu
Security Measurements of
Steganographic Systems *
Weiming Zhang,
Shiqu Li
X2Rep: Enhanced Trust Semantics for the XRep Protocol
Nathan Curtis,
Rei Safavi-Naini, Willy Susilo
One-Round Protocols for Two-Party Authenticated Key Exchange
Ik Rae Jeong,
Jonathan Katz, Dong Hoon Lee
Password Authenticated Key Exchange Using Quadratic Residues
Muxiang Zhang
Key Agreement Using Statically Keyed Authenticators
Colin Boyd, Wenbo
Mao, Kenneth G. Paterson
Low-Latency Cryptographic Protection for SCADA Communications
Andrew K.
Wright, John A. Kinast, Joe McCarty
A Best Practice for Root CA Key Update in PKI
InKyoung Jeun,
Jongwook Park, TaeKyu Choi, SangWan Park, BaeHyo Park, ByungKwon Lee,
YongSup Shin
SQLrand: Preventing SQL Injection Attacks
Stephen W. Boyd,
Angelos D. Keromytis
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem
Bin Zhang,
Hongjun Wu, Dengguo Feng, Feng Bao
Success Probability in χ2-Attacks
Takashi
Matsunaka, Atsuko Miyaji, Yuuki Takano
More Generalized Clock-Controlled Alternating Step Generator
Ali A. Kanso
FDLKH: Fully Decentralized Key Management Scheme on Logical Key
Hierarchy
Daisuke Inoue,
Masahiro Kuroda
Unconditionally Non-interactive Verifiable Secret Sharing Secure
against Faulty Majorities in the Commodity Based Model
Anderson C.A.
Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki
Imai
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and
an Improvement for True Anonymity
Bok-Min Goi,
Raphael C.-W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M.U.
Siddiqi
Security Analysis of CRT-Based Cryptosystems
Katsuyuki Okeya,
Tsuyoshi Takagi
Cryptanalysis of the Countermeasures Using Randomized Binary Signed
Digits
Dong-Guk Han,
Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan
Jung
Weaknesses of a Password-Authenticated Key Exchange Protocol between
Clients with Different Passwords
Shuhong Wang, Jie
Wang, Maozhi Xu
Advanced Packet Marking Mechanism with Pushback for IP Traceback
Hyung-Woo Lee
A Parallel Intrusion Detection System for High-Speed Networks
Haiguang Lai,
Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li
A Novel Framework for Alert Correlation and Understanding
Dong Yu, Deborah
Frincke
An Improved Algorithm for uP
+ vQ Using JSF13
BaiJie Kuang,
YueFei Zhu, YaJuan Zhang
New Table Look-Up Methods for Faster Frobenius Map Based Scalar
Multiplication Over GF(pn)
Palash Sarkar,
Pradeep Kumar Mishra, Rana Barua
Batch Verification for Equality of Discrete Logarithms and Threshold
Decryptions
Riza Aditya, Kun
Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Two-Server
Password-Only Authenticated Key Exchange
Jonathan Katz, Philip MacKenzie,
Gelareh Taban, Virgil Gligor
Strengthening Password-Based Authentication Protocols Against Online
Dictionary Attacks
Peng Wang, Yongdae Kim, Vishal
Kher, Taekyoung Kwon
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange
(C2C-PAKE) Scheme
Raphael C.-W. Phan, Bok-Min Goi
Efficient Security Mechanisms for Overlay
Multicast-Based Content Distribution
Sencun Zhu, Chao Yao, Donggang Liu,
Sanjeev Setia, Sushil Jajodia
A Traitor Tracing Scheme Based on RSA for Fast Decryption
John Patrick McGregor, Yiqun Lisa
Yin, Ruby B. Lee
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun, Dong Hoon Lee
Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records
Virgil Griffith, Markus Jakobsson
Mitigating Network Denial-of-Service Through
Diversity-Based Traffic Management
Ashraf Matrawy, Paul C. van
Oorschot, Anil Somayaji
Searching for High-Value Rare Events with Uncheatable Grid Computing
Wenliang Du, Michael T. Goodrich
Digital Signatures Do Not Guarantee Exclusive Ownership
Thomas Pornin, Julien P. Stern
Thompson’s Group and Public Key Cryptography
Vladimir Shpilrain, Alexander
Ushakov
Rainbow,
a New Multivariable Polynomial Signature Scheme
Jintai Ding, Dieter Schmidt
Badger – A Fast and Provably Secure MAC
Martin Boesgaard, Thomas
Christensen, Erik Zenner
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
Abdulrahman Alharby, Hideki Imai
Indexing
Information for Data Forensics
Michael T. Goodrich, Mikhail J.
Atallah, Roberto Tamassia
Model
Generalization and Its Implications on Intrusion Detection
Zhuowei Li, Amitabha Das, Jianying Zhou
Intrusion-Resilient Secure Channels
Gene Itkis, Robert McNerney Jr.,
Scott Russell
Optimal
Asymmetric Encryption and Signature Paddings
Benoıt Chevallier-Mames, Duong
Hieu Phan, David Pointcheval
Efficient
and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
SeongHan Shin, Kazukuni Kobara, Hideki
Imai
Identity
Based Encryption Without Redundancy
Benoıt Libert, Jean-Jacques
Quisquater
OACerts: Oblivious Attribute Certificates
Jiangtao Li, Ninghui Li
Dynamic k-Times Anonymous Authentication
Lan Nguyen, Rei Safavi-Naini
Efficient
Anonymous Roaming and Its Security Analysis
Guomin Yang, Duncan S. Wong,
Xiaotie Deng
Quantifying Security in Hybrid Cellular Networks
Markus Jakobsson, Liu Yang
Off-Line
Karma: A Decentralized Currency for Peer-to-peer and
Grid Applications
Flavio D. Garcia, Jaap-Henk Hoepman
Building
Reliable Mix Networks with Fair Exchange
Michael K. Reiter, XiaoFeng Wang,
Matthew Wright
SCARE
of the DES (Side Channel Analysis for Reverse Engineering of the Data
Encryption Standard)
Remy Daudigny, Herve
Ledig, Frederic Muller, Frederic Valette
Robust
Key Extraction from Physical Uncloneable Functions
B. Skoric, P. Tuyls, W. Ophey
Efficient
Constructions for One-Way Hash Chains
Yih-Chun Hu, Markus Jakobsson, Adrian
Perrig
Privacy
Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Michael Mitzenmacher
An Efficient
Solution to the Millionaires’ Problem Based on Homomorphic
Encryption
Hsiao-Ying Lin, Wen-Guey Tzeng
Non-interactive
Zero-Knowledge Arguments for Voting
Jens Groth
Short Signature and Universal Designated Verifier Signature Without Random
Oracles
Rui Zhang, Jun Furukawa, Hideki Imai
Efficient
Identity Based Ring Signature
Sherman S.M. Chow, Siu-Ming Yiu,
Lucas C.K. Hui
New
Signature Schemes with Coupons and Tight Reduction
Benoıt Chevallier-Mames
Adaptive
Detection of Local Scanners *
Ahren Studer, Chenxi Wang
Probabilistic
Proof of an Algorithm to Compute TCP Packet Round-Trip Time for
Intrusion Detection
Jianhua Yang, Yongzhong Zhang
DSO:
Dependable Signing Overlay
Guofei Gu, Prahlad Fogla, Wenke
Lee, Douglas Blough
Do Broken Hash
Functions Affect the Security of Time-Stamping Schemes?
Ahto Buldas, Sven Laur
A Handy
Multi-coupon System
Sebastien Canard, Aline Gouget,
Emeline Hufschmitt
An
Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Dongvu Tonien, Reihaneh Safavi-Naini
Efficient
Memory Bound Puzzles Using Pattern Databases
Sujata Doshi, Fabian Monrose, Aviel
D. Rubin
Effect
of Malicious Synchronization
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
Misusing
Unstructured P2P Systems to Perform DoS Attacks: The Network That Never
Forgets
Elias Athanasopoulos, Kostas G.
Anagnostakis, Evangelos P. Markatos
Password
Based Server Aided Key Exchange
Yvonne Cliff, Yiu Shing Terry Tin,
Colin Boyd
Secure
Password-Based Authenticated Group Key Agreement for Data-Sharing
Peer-to-Peer Networks
Qiang Tang, Kim-Kwang Raymond Choo
Stateful
Subset Cover
Mattias Johansson, Gunnar Kreitz,
Fredrik Lindholm
The Rainbow
Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Khoongming Khoo, Guang Gong,
Hian-Kiat Lee
Breaking
a New Instance of TTM Cryptosystems
Xuyun Nie, Lei Hu, Jianyu Li, Crystal
Updegrove, Jintai Ding
Cryptanalysis
of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different
Passwords
Raphael C.-W. Phan, Bok-Min Goi
An AES Smart
Card Implementation Resistant to Power Analysis Attacks
Christoph Herbst, Elisabeth Oswald,
Stefan Mangard
Physical
Security Bounds Against Tampering
Kerstin Lemke, Christof Paar,
Ahmad-Reza Sadeghi
Flexible
Exponentiation with Resistance to Side Channel Attacks
Camille Vuillaume, Katsuyuki Okeya
An Improved
Poly1305 MAC
Dayin Wang, Dongdai Lin, Wenling Wu
Certificateless
Public-Key Signature: Security Model and Efficient Construction
Zhenfeng Zhang, Duncan S. Wong, Jing Xu,
Dengguo Feng
High
Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic
Primitive
Chetan Nanjunda Mathur, Karthik
Narayan, K.P. Subbalakshmi
Authentication
for Paranoids: Multi-party Secret Handshakes
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
On the Security of the Authentication Module of Chinese WLAN Standard
Implementation Plan
Xinghua Li, SangJae Moon, Jianfeng
Ma
W3Bcrypt:
Encryption as a Stylesheet
Angelos Stavrou, Michael E.
Locasto, Angelos D. Keromytis
Combinatorial
Structures for Design of Wireless Sensor Networks
Dibyendu Chakrabarti, Jennifer Seberry
Public
Key Cryptography Sans Certificates in Ad Hoc Networks *
Nitesh Saxena
Location-Aware
Key Management Using Multi-layer Grids for Wireless Sensor Networks
JongHyup Lee, Taekyoung Kwon,
Jooseok Song
A General
Methodology for Pipelining the Point Multiplication Operation in Curve
Based Cryptography
Kishan Chand Gupta, Pradeep Kumar
Mishra, Pinakpani Pal
Results
on Almost Resilient Functions
Pinhui Ke, Jie Zhang, Qiaoyan Wen
Real
Perfect Contrast Visual Secret Sharing Schemes with Reversing
Ching-Nung Yang, Chung-Chun Wang,
Tse-Shih Chen
On
Optimizing the Security-Throughput Trade-Off in Wireless Networks with
Adversaries
Mohamed A. Haleem, Chetan Nanjunda
Mathur, R. Chandramouli, K.P. Subbalakshmi
Improving
the Randomized Initial Point Countermeasure Against DPA
Kouichi Itoh, Tetsuya Izu, Masahiko
Takenaka
Syntax-Driven
Private Evaluation of Quantified Membership Queries
Aggelos Kiayias, Antonina
Mitrofanova
Generic Transformation to
Strongly Unforgeable Signatures
Qiong Huang,
Duncan S. Wong, Yiming Zhao
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Xiaofeng Chen,
Fangguo Zhang, Willy Susilo, Yi Mu
Merkle Signatures with Virtually Unlimited Signature Capacity
Johannes
Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille
Vuillaume
Midpoints Versus Endpoints: From
Protocols to Firewalls *
Diana von
Bidder-Senn, David Basin, Germano Caronni
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking
Scheme
Liang Lu, Rei
Safavi-Naini, Jeffrey Horton, Willy Susilo
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Zhengqin Luo,
Xiaojuan Cai, Jun Pang, Yuxin Deng
Cryptanalysis of the TRMC-4 Public Key Cryptosystem
Xuyun Nie, Lei
Hu, Jintai Ding, Jianyu Li, John Wagner
Estimating the Prime-Factors of an RSA Modulus and an Extension of the
Wiener Attack
Hung-Min Sun,
Mu-En Wu, Yao-Hsin Chen
A Timing Attack on Blakley’s Modular Multiplication Algorithm, and
Applications to DSA
Bahador Bakhshi,
Babak Sadeghiyan
Protecting AES Software Implementations on 32-Bit Processors Against
Power Analysis
Stefan Tillich,
Christoph Herbst, Stefan Mangard
Constant-Round Authenticated Group Key Exchange with Logarithmic
Computation Complexity
Junghyun Nam,
Juryon Paik, Ung Mo Kim, Dongho Won
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
Xuxin Xu, Lingyu
Wang, Amr Youssef, Bo Zhu
Bayesian Methods for Practical Traitor Tracing
Philip Zigoris,
Hongxia Jin
A New Protocol for Conditional Disclosure of Secrets and Its
Applications
Sven Laur, Helger
Lipmaa
An Unconditionally Secure Protocol for Multi-Party Set Intersection
Ronghua Li,
Chuankun Wu
Privacy-Preserving Set Union
Keith Frikken
Universal Accumulators with Efficient Nonmembership Proofs
Jiangtao Li,
Ninghui Li, Rui Xue
Unlinkable Secret Handshakes and Key-Private Group Key Management
Schemes
Stanislaw
Jarecki, Xiaomin Liu
Identity-Based Proxy Re-encryption
Matthew Green,
Giuseppe Ateniese
A More Natural Way to Construct Identity-Based Identification Schemes
Guomin Yang, Jing
Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
Rui Zhang
Certified E-Mail Protocol in the ID-Based Setting
Chunxiang Gu,
Yuefei Zhu, Yonghui Zheng
Efficient Content Authentication in Peer-to-Peer Networks
Roberto Tamassia,
Nikos Triandopoulos
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
Fagen Li, Yupu
Hu, Chuanrong Zhang
Efficient Self-healing Key Distribution with Revocation for Wireless
Sensor Networks Using One Way Key Chains
Ratna Dutta,
Ee-Chien Chang, Sourav Mukhopadhyay
BAP: Broadcast Authentication Using Cryptographic Puzzles
Patrick Schaller,
Srdjan Capkun, David Basin
Compressed XTR
Masaaki Shirase,
Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
Sliding Window Method for NTRU
Mun-Kyu Lee, Jung
Woo Kim, Jeong Eun Song, Kunsoo Park
Efficient Certificateless Signature Schemes
Kyu Young Choi,
Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
Security Mediated Certificateless Signatures
Wun-She Yap,
Sherman S.M. Chow, Swee-Huay Heng, Bok-Min Goi
Gradually Convertible Undeniable Signatures
Laila El Aimani,
Damien Vergnaud
On the Effectiveness of
Internal Patching Against File-Sharing Worms *
Liang Xie, Hui Song, Suncun Zhu
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Moheeb Abu Rajab, Fabian Monrose, Andreas
Terzis, Niels Provos
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Angelos Stavrou,
Michael E. Locasto,
Angelos D. Keromytis
PPAA: Peer-to-Peer Anonymous Authentication
Patrick P. Tsang,
Sean W. Smith
Generic Constructions of Stateful Public Key Encryption and Their
Applications
Joonsang Baek,
Jianying Zhou, Feng Bao
Traceable and Retrievable Identity-Based Encryption
Man Ho Au, Qiong
Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
Attribute-Based Encryption with Partially Hidden Encryptor-Specified
Access Structures
Takashi Nishide,
Kazuki Yoneyama, Kazuo Ohta
Attacking Reduced Round SHA-256
Somitra Kumar
Sanadhya, Palash Sarkar
Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric
Cryptography
Ivan B. Damgard,
Lars R. Knudsen, Soren S. Thomsen
Getting the Best Out of Existing Hash Functions; or What if We Are
Stuck with SHA?
Yevgeniy Dodis,
Prashant Puniya
Replay Attack in a Fair Exchange Protocol
Macia
Mut-Puigserver, Magdalena Payeras-Capella, Josep Lluis Ferrer-Gomila,
Llorenc Huguet-Rotger
Improved Conditional E-Payments
Marina Blanton
Anonymity in Transferable E-cash
Sebastien Canard,
Aline Gouget
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Jin Li, Kwangjo
Kim, Fangguo Zhang, Duncan S. Wong
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding,
Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
Trapdoor Sanitizable Signatures and Their Application to Content
Protection
Sebastien Canard,
Fabien Laguillaumie, Michel Milhau
Multi-factor Authenticated Key Exchange
David
Pointcheval, Sebastien Zimmer
Repelling Detour Attack Against Onions with Re-encryption
Marek Klonowski,
Miroslaw Kutylowski, Anna Lauks
Analysis of EAP-GPSK Authentication Protocol
John C. Mitchell,
Arnab Roy, Paul Rowe, Andre Scedrov
Efficient Device Pairing Using "Human-Comparable" Synchronized
Audiovisual Patterns
Ramnath Prasad,
Nitesh Saxena
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
Ghaith Hammouri,
Berk Sunar
An Authentication Scheme Based on the Twisted Conjugacy Problem
Vladimir
Shpilrain, Alexander Ushakov
Restricted Queries over an Encrypted Index with Applications to
Regulatory Compliance
Nikita Borisov,
Soumyadeb Mitra
A Practical and Efficient Tree-List Structure for Public-Key
Certificate Validation
Tong-Lee Lim, A.
Lakshminarayanan, Vira Saksen
On the Security of the CCM Encryption Mode and of a Slight Variant
Pierre-Alain
Fouque, Gwenaelle Martinet, Frederic Valette, Sebastien Zimmer
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm
Brian King
A Very Compact “Perfectly Masked” S-Box for AES
D. Canright,
Lejla Batina
Steel, Cast Iron and Concrete: Security Engineering for Real World
Wireless Sensor Networks
Frank Stajano,
Dan Cvrcek, Matt Lewis
Traceable Privacy of Recent Provably-Secure RFID Protocols
Khaled Ouafi,
Raphael C.-W. Phan
The Security of EPC Gen2 Compliant RFID Protocols
Mike Burmester,
Breno de Medeiros
Group Key Exchange
Enabling On-Demand Derivation of Peer-to-Peer Keys
Mark Manulis
Session-state Reveal
Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS
Authenticated Key Exchange Protocol
Cas J.F. Cremers
Secure
Pairing of “Interface-Constrained” Devices Resistant against Rushing
User Behavior
Nitesh Saxena, Md. Borhan Uddin
How to
Extract and Expand Randomness: A Summary and Explanation of Existing
Results
Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
Novel
Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, Catherine Gebotys
Practical
Secure Evaluation of Semi-private Functions
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
Secure
Hamming Distance Based Computation and Its Applications *
Ayman Jarrous, Benny Pinkas
Efficient
Robust Private Set Intersection
Dana Dachman-Soled, Tal Malkin, Mariana Raykova,
Moti Yung
A New
Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying
Zhou
An
Efficient Identity-Based Online/Offline Encryption Scheme
Joseph K. Liu, Jianying Zhou
Dual-Policy
Attribute Based Encryption
Nuttapong Attrapadung, Hideki Imai
Construction
of Threshold Public-Key Encryptions through Tag-Based Encryptions
Seiko Arita, Koji Tsurudome
Malyzer:
Defeating Anti-detection for Application-Level Malware Analysis
Lei Liu, Songqing Chen
A New
Message Recognition Protocol with Self-recoverability for Ad Hoc
Pervasive Networks
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
Breaking
Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
MoonShik Lee, Daegun Ma, MinJae Seo
Tracing
and Revoking Pirate Rebroadcasts
Aggelos Kiayias, Serdar Pehlivanoglu
Efficient
Deniable Authentication for Signatures: Application to Machine-Readable
Travel Document
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
Homomorphic
MACs: MAC-Based Integrity for Network Coding
Shweta Agrawal, Dan Boneh
Algorithmic
Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi
Shimbo
Performance
Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Jorg Lenhard, Karsten Loesing, Guido Wirtz
Cryptanalysis
of Twister
Florian Mendel, Christian Rechberger, Martin
Schlaffer
Cryptanalysis
of CubeHash
Eric Brier, Thomas Peyrin
Collision
Attack on Boole
Florian Mendel, Tomislav Nad, Martin Schlaffer
Integrity
Protection for Revision Control
Christian Cachin, Martin Geisler
Fragility
of the Robust Security Network: 802.11 Denial of Service
Martin Eian
Fast
Packet Classification Using Condition Factorization
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
Choosing
NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM
Approaches
Philip S. Hirschhorn, Jeffrey Hoffstein, Nick
Howgrave-Graham, William Whyte
Broadcast
Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo
Partial
Key Exposure Attack on CRT-RSA
Santanu Sarkar, Subhamoy Maitra
How to
Compare Profiled Side-Channel Attacks?
Francois-Xavier Standaert, Francois Koeune, Werner
Schindler
Theoretical
and Practical Aspects of Mutual Information Based Side Channel Analysis
Emmanuel Prouff, Matthieu Rivain
Attacking
ECDSA-Enabled RFID Devices
Michael Hutter, Marcel Medwed, Daniel Hein, Johannes
Wolkerstorfer
On the Broadcast and Validity-Checking
Security of PKCS#1 v1.5 Encryption *
Aurelie Bauer,
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption
Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou,
Haojin Zhu, Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
Xavier Boyen, Brent Waters
Trapdoor Sanitizable Signatures Made Easy
Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures
without Random Oracles or NIZKs
Markus Ruckert, Michael Schneider, Dominique Schroder
Redactable Signatures for Tree-Structured Data: Definitions and
Constructions
Christina Brzuska, Heike Busch, Oezguer Dagdelen,
Marc Fischlin, Martin Franz, Stefan Katzenbeisser,
Mark Manulis, Cristina Onete, Andreas Peter, Bertram
Poettering, Dominique Schroder
Impossible Differential Cryptanalysis on Feistel Ciphers with SP
and SPS Round Functions
Yuechuan Wei, Ping Li, Bing Sun, Chao Li
Multi-trail Statistical Saturation Attacks
Baudoin Collard, Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G⊕
Alex Biryukov, Deike
Priemuth-Schmid, Bin Zhang
High Performance GHASH Function for Long Messages
Nicolas Meloni, Christophe Negre, M. Anwar Hasan
Principles on the Security of AES against First and Second-Order
Differential Power Analysis
Jiqiang Lu, Jing Pan, Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks
Nicolas Veyrat-Charvillon, Francois-Xavier Standaert
Secure Multiplicative Masking of Power Functions
Laurie Genelle, Emmanuel Prouff, Michael Quisquater
Batch Groth–Sahai
Olivier Blazy, Georg Fuchsbauer, Malika Izabachene,
Amandine Jambert, Herve Sibert, Damien Vergnaud
Efficient and Secure Evaluation of Multivariate Polynomials and
Applications
Matthew Franklin, Payman Mohassel
Efficient Implementation of the Orlandi Protocol
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes
Aggelos Kiayias, Serdar Pehlivanoglu
Password Based Key Exchange Protocols on Elliptic Curves Which
Conceal the Public Parameters
Julien Bringer, Herve Chabanne, Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman
with Minimal Overhead
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
Deniable Internet Key Exchange
Andrew C. Yao, Yunlei Zhao
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
Secure Sketch for Multiple Secrets
Chengfang Fang, Qiming Li, Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions
Atefeh Mashatan, Serge Vaudenay
Affiliation-Hiding Key Exchange with Untrusted Group Authorities
Mark Manulis, Bertram Poettering, Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity
Mark Manulis, Benny Pinkas, Bertram Poettering
Two New Efficient PIR-Writing Protocols
Helger Lipmaa, Bingsheng Zhang
Regulatory Compliant Oblivious RAM
Bogdan Carbunar, Radu Sion
Revisiting Unpredictability-Based RFID Privacy Models
Junzuo Lai, Robert H. Deng, Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption
Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan
Visconti, Christian Wachsmann
Social Network-Based Botnet Command-and-Control: Emerging
Threats and Countermeasures
Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai
Xu, Ravi Sandhu
COP: A Step toward Children Online Privacy
Wei Xu, Sencun Zhu, Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action
Online Advertising
Xuhua Ding
Inferring Protocol
State Machine from Network Traces: A Probabilistic Approach
Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao,
Buyun Qu, Li Guo
A Specification Based Intrusion Detection Framework for Mobile
Phones
Ashwin Chaugule, Zhi Xu, Sencun Zhu
Misuse Detection in Consent-Based Networks
Mansoor Alicherry, Angelos D. Keromytis
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
Martin Albrecht, Carlos Cid
Exponent Blinding Does not Always Lift (Partial) Spa Resistance
to Higher-Level Security
Werner Schindler, Kouichi Itoh
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory
and CryptoRF
Alex Biryukov, Ilya Kizhvatov, Bin Zhang
Cache Timing Analysis of RC4
Thomas Chardin, Pierre-Alain Fouque, Delphine
Leresteux
Secure Efficient Multiparty Computing of Multivariate
Polynomials and Applications
Dana Dachman-Soled, Tal Malkin, Mariana Raykova,
Moti Yung
Private Discovery of Common Social Contacts
Emiliano De Cristofaro, Mark Manulis, Bertram
Poettering
Sanitizable Signatures in XML Signature — Performance, Mixing
Properties, and Revisiting the Property of Transparency
Henrich C. Pohls, Kai Samelin, Joachim Posegga
Double-Trapdoor Anonymous Tags for Traceable Signatures
Masayuki Abe, Sherman S.M. Chow, Kristiyan
Haralambiev, Miyako Ohkubo
Hierarchical Identity-Based Chameleon Hash and Its Applications
Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai,
Yunlei Zhao
Efficient Generic Constructions of Signcryption with Insider
Security in the Multi-user Setting
Daiki Chiba, Takahiro Matsuda, Jacob C.N. Schuldt,
Kanta Matsuura
Quantitatively Analyzing Stealthy Communication Channels
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
Fully Non-interactive Onion Routing with Forward-Secrecy
Dario Catalano, Mario Di Raimondo, Dario Fiore,
Rosario Gennaro, Orazio Puglisi
Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Simple and Efficient Single Round Almost Perfectly Secure
Message Transmission Tolerating Generalized Adversary
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Relaxed Security Notions for Signatures of Knowledge
Marc Fischlin, Cristina Onete
LBlock: A Lightweight Block Cipher
Wenling Wu, Lei Zhang
On Hiding a Plaintext Length by Preencryption
Cihangir Tezcan, Serge Vaudenay
Fighting Pirates 2.0
Paolo D’Arco, Angel L. Perez del Pozo
Security Notions for
Broadcast Encryption *
Duong Hieu Phan, David Pointcheval, Mario Strefler
Towards User-Friendly Credential Transfer on Open Credential
Platforms
Kari Kostiainen, N. Asokan, Alexandra Afanasyeva
Non-transferable User Certification Secure against Authority
Information Leaks and Impersonation Attacks
Jacob C.N. Schuldt, Goichiro Hanaoka
Composable Security Analysis of OS Services
Ran Canetti, Suresh Chari, Shai Halevi, Birgit
Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
Practical Attacks on the Maelstrom-0 Compression Function
Stefan Kolbl, Florian Mendel
Linear Analysis of Reduced-Round CubeHash
Tomer Ashur, Orr Dunkelman
On the Indifferentiability of Fugue and Luffa
Rishiraj Bhattacharyya, Avradip Mandal
Analysis of Message Injection in Stream Cipher-Based Hash
Functions
Yuto Nakano, Carlos Cid, Kazuhide Fukushima,
Shinsaku Kiyomoto
Secure Authenticated Comparisons
Keith B. Frikken, Hao Yuan, Mikhail J. Atallah
Public-Key Encryption with Delegated Search
Luan Ibraimi, Svetla Nikova, Pieter Hartel, Willem
Jonker
Security
Analysis of a Multi-factor Authenticated Key Exchange Protocol
Feng Hao, Dylan
Clarke
Breaking an Animated CAPTCHA Scheme
Vu Duc Nguyen,
Yang-Wai Chow, Willy Susilo
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with
Wireless Hardware Tokens
Assaf Ben-David,
Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung
RIKE: Using Revocable Identities to Support Key Escrow in PKIs
Nan Zhang,
Jingqiang Lin, Jiwu Jing, Neng Gao
TreVisor: OS-Independent Software-Based Full Disk Encryption Secure
against Main Memory Attacks
Tilo Muller,
Benjamin Taubmann, Felix C. Freiling
Authenticated Encryption: How Reordering Can Impact Performance
Basel Alomair
Length-Doubling Ciphers and Tweakable Ciphers
Haibin Zhang
Extending Higher-Order Integral: An Efficient Unified Algorithm of
Constructing Integral Distinguishers for Block Ciphers
Wentao Zhang,
Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu
Security Enhancements by OR-Proof in Identity-Based Identification
Atsushi Fujioka,
Taiichi Saito, Keita Xagawa
Identity-Based Extractable Hash Proofs and Their Applications
Yu Chen, Zongyang
Zhang, Dongdai Lin, Zhenfu Cao
On Structural Signatures for Tree Data Structures
Kai Samelin, Henrich C. Pohls, Arne Bilzhause,
Joachim Posegga, Hermann de Meer
Inner-Product Lossy Trapdoor Functions and Applications
Xiang Xie, Rui Xue, Rui Zhang
On the Joint Security of Signature and Encryption Schemes under
Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Secure Accumulators from Euclidean Rings without Trusted Setup
Helger Lipmaa
Linear Fault Analysis of Block Ciphers
Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
Yuki Asano, Shingo Yanagihara, Tetsu Iwata
Distinguishers beyond Three Rounds of the RIPEMD-128/-160
Compression Functions
Yu Sasaki, Lei Wang
Zero-Value Point Attacks on Kummer-Based Cryptosystem
Fangguo Zhang,
Qiping Lin, Shengli Liu
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel
Resistance
Gilles Piret,
Thomas Roche, Claude Carlet
Wide Collisions in Practice *
Xin Ye, Thomas
Eisenbarth
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
Reihaneh
Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
A Prefiltering Approach to Regular Expression Matching for Network
Security Systems
Tingwen Liu, Yong
Sun, Alex X. Liu, Li Guo, Binxing Fang
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
Jason Gionta, Peng
Ning, Xiaolan Zhang
ARC: Protecting against HTTP Parameter Pollution Attacks Using
Application Request Caches
Elias
Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis,
Evangelos P. Markatos
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web
Content for Privacy Violations
Minh Tran, Xinshu
Dong, Zhenkai Liang, Xuxian Jiang
The Shy Mayor: Private Badges in GeoSocial Networks
Bogdan Carbunar,
Radu Sion, Rahul Potharaju, Moussa Ehsan
Detecting Social Spam Campaigns on Twitter
Zi Chu, Indra
Widjaja, Haining Wang
A New Framework for Privacy of RFID Path Authentication
Shaoying Cai,
Robert H. Deng, Yingjiu Li, Yunlei Zhao
GHB#: A Provably Secure HB-Like Lightweight Authentication
Protocol
Panagiotis
Rizomiliotis, Stefanos Gritzalis
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in
the Cloud
Boyang Wang,
Baochun Li, Hui Li
SPICE – Simple Privacy-Preserving Identity-Management for Cloud
Environment
Sherman S.M.
Chow, Yi-Jun He, Lucas C.K. Hui, Siu Ming Yiu
A Practical Smart Metering System Supporting Privacy Preserving Billing
and Load Monitoring
Hsiao-Ying Lin,
Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh P. Lin
Private Computation of Spatial and Temporal Power Consumption with
Smart Meters
Zekeriya Erkin,
Gene Tsudik
Transparent,
Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad, Alptekin Küpçü
Client-Controlled Cryptography-as-a-Service in the Cloud
Sören Bleikertz, Sven Bugiel, Hugo Ideler,
Stefan Nürnberger, Ahmad-Reza Sadeghi
CloudHKA: A Cryptographic Approach for Hierarchical Access
Control in Cloud Computing
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng,
Jianying Zhou
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin,
Manuel Maasz, Nils Fabian Reimers, Richard Stein
Towards Efficient Private Distributed Computation on Unbounded
Input Streams
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir
Kolesnikov, Yelena Yuditsky
From Oblivious AES to Efficient and Secure Database Join in the
Multiparty Setting
Sven Laur, Riivo Talviste, Jan Willemson
Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang,
David J. Wu
BLAKE2: Simpler, Smaller, Fast as MD5
Jean-Philippe Aumasson, Samuel Neves, Zooko
Wilcox-O’Hearn, Christian Winnerlein
Cryptophia’s Short Combiner
for Collision-Resistant Hash Functions *
Arno Mittelbach
Generic
Attacks for the Xor of k Random Permutations
Jacques Patarin
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the
Last Network Twist
Yu Sasaki
Constructing Practical Signcryption KEM from Standard
Assumptions without Random Oracles
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian
Weng
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee, Moti Yung
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and
(H)IBE
Rikke Bendlin,
Sara Krehbiel, Chris Peikert
Toward Practical Group Encryption
Laila El Aimani, Marc Joye
Experimental Analysis of Attacks on Next Generation Air Traffic
Communication
Matthias Schäfer, Vincent Lenders, Ivan
Martinovic
Launching Generic Attacks on iOS with Approved Third-Party
Applications
Jin Han, Su Mon
Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao, Yingjiu Li, Jianying
Zhou
Hardware Architectures for
MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve
Cryptography *
Erich Wenger
Beyond Full Disk Encryption: Protection on Security-Enhanced
Commodity Processors
Michael Henson, Stephen Taylor
NEON Implementation of an Attribute-Based Encryption Scheme
Ana Helena Sánchez, Francisco
Rodríguez-Henríquez
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen, Jesper Buus Nielsen
Comparing the Pairing Efficiency over Composite-Order and
Prime-Order Elliptic Curves
Aurore Guillevic
FROST: Forensic Recovery of Scrambled Telephones
Tilo Müller, Michael Spreitzenbarth
Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose
Hardware
Alexander Wild, Tim Güneysu, Amir Moradi
Keystroke Timing Analysis of on-the-fly Web Apps
Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang
Terrorism in Distance Bounding: Modeling Terrorist-Fraud
Resistance
Marc Fischlin, Cristina Onete
CrowdShare: Secure Mobile Resource Sharing
N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena
Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle
Remotegrity: Design and Use of an End-to-End Verifiable Remote
Voting System
Filip Zagórski, Richard T. Carback, David
Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
Exposure-Resilient One-Round Tripartite Key Exchange without
Random Oracles
Koutarou Suzuki, Kazuki Yoneyama
Public Key Exchange Using Semidirect Product of (Semi) Groups
Maggie Habeeb, Delaram Kahrobaei, Charalambos
Koupparis, Vladimir Shpilrain
Leakage Resilient IBE and IPE under the DLIN Assumption
Kaoru Kurosawa, Le Trieu Phong
Batch Proofs of Partial Knowledge
Ryan Henry, Ian Goldberg
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard, Georg Fuchsbauer, Essam Ghadafi
Analysis and Improvement of Lindell’s UC-Secure Commitment
Schemes
Olivier Blazy, Céline Chevalier, David
Pointcheval, Damien Vergnaud
Primeless Factoring-Based Cryptography
Sonia Bogos, Ioana Boureanu, Serge Vaudenay
New Modular Compilers
for Authenticated Key Exchange
Yong Li, Sven Schage, Zheng Yang,
Christoph Bader, Jorg Schwenk
Password-Based Authenticated Key Exchange without Centralized Trusted
Setup
Kazuki Yoneyama
A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
M. Kreuzer, A.D.
Myasnikov, A. Ushakov
Improved Constructions of PRFs Secure against Related-Key Attacks
Kevin Lewi, Hart
Montgomery, Ananth Raghunathan
Verifiable Multi-server Private Information Retrieval
Liang Feng Zhang,
Reihaneh Safavi-Naini
Certified Bitcoins
Giuseppe
Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Jia Xu, Jianying
Zhou
Private Message Transmission Using Disjoint Paths
Hadi Ahmadi,
Reihaneh Safavi-Naini
Partial Key Exposure Attacks on Takagi’s Variant of RSA
Zhangjie Huang,
Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Yao Lu, Rui
Zhang, Dongdai Lin
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited
Taechan Kim,
Mehdi Tibouchi
All-but-One Dual Projective Hashing and Its Applications
Zongyang Zhang,
Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
Distributed Smooth Projective Hashing and Its Application to Two-Server
Password Authenticated Key Exchange
Franziskus
Kiefer, Mark Manulis
Sakura: A Flexible Coding for Tree Hashing
Guido Bertoni,
Joan Daemen, Michael Peeters, Gilles Van Assche
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass
Hash Functions
Yusuke Naito,
Kazuki Yoneyama, Kazuo Ohta
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results
and Applications
Yu Sasaki
On the (In)Equivalence of Impossible Differential and Zero-Correlation
Distinguishers for Feistel- and Skipjack-Type Ciphers
Celine Blondeau,
Andrey Bogdanov, Meiqin Wang
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function
Bingke Ma, Bao
Li, Ronglin Hao, Xiaoqian Li
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Yanfeng Wang,
Wenling Wu, Zhiyuan Guo, Xiaoli Yu
Detecting Hidden Leakages
*
Amir Moradi,
Sylvain Guilley, Annelie Heuser
Improving Intrusion Detection Systems for Wireless Sensor Networks
Andriy Stetsko,
Tobias Smolka, Vashek Matyas, Martin Stehlık
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless
Sensor Networks
Zhe Liu, Erich
Wenger, Johann Großschadl
BackRef: Accountability in Anonymous Communication Networks
Michael Backes,
Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel
WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP
Michael Backes,
Rainer W. Gerling, Sebastian Gerling, Stefan Nurnberger, Dominique
Schroder, Mark Simkin
A Revocable Group Signature Scheme from Identity-Based Revocation
Techniques: Achieving Constant-Size Revocation List
Nuttapong
Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai
Faster Batch Verification of Standard ECDSA Signatures Using Summation
Polynomials
Sabyasachi
Karati, Abhijit Das
On Updatable Redactable Signatures
Henrich C. Pohls,
Kai Samelin
Practical Signatures from the Partial Fourier Recovery Problem
Jeff Hoffstein,
Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
Activity Spoofing and Its Defense in Android Smartphones
Brett Cooley,
Haining Wang, Angelos Stavrou
Polymorphism as a Defense for Automated Attack of Websites
Xinran Wang,
Tadayoshi Kohno, Bob Blakley
Fragmentation Considered Leaking: Port Inference for DNS Poisoning
Haya Shulman,
Michael Waidner
Delegating a Pairing Can Be Both Secure and Efficient
Sebastien Canard,
Julien Devigne, Olivier Sanders
Automatic Protocol Selection in Secure Two-Party Computations
Florian
Kerschbaum, Thomas Schneider, Axel Schropfer
Universally
Verifiable Multiparty Computation from Threshold Homomorphic
Cryptosystems
Berry Schoenmakers, Meilof Veeningen
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron,
Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
Round-Optimal Password-based Group Key Exchange Protocols in the
Standard Model
Jing Xu, Xuexian
Hu, Zhenfeng Zhang
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy,
Celine Chevalier
Non-malleability under Selective Opening Attacks: Implication and
Separation
Zhengan Huang,
Shengli Liu, Xianping Mao, Kefei Chen
A Signature Scheme with a Fuzzy Private Key
Kenta Takahashi,
Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor
Tracing, Revocation, and Large Universe
Zhen Liu, Duncan
S. Wong
Zero-Knowledge Authenticated Order
Queries and Order Statistics on a List *
Esha
Ghosh, Olga Ohrimenko, Roberto Tamassia
Private Database Access with HE-over-ORAM Architecture
Craig Gentry,
Shai Halevi, Charanjit Jutla, Mariana Raykova
Accumulable Optimistic Fair Exchange from Verifiably Encrypted
Homomorphic Signatures
Jae Hong Seo,
Keita Emura, Keita Xagawa, Kazuki Yoneyama
LightCore: Lightweight Collaborative Editing Cloud Services for
Sensitive Data
Weiyu Jiang,
Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
Violating Consumer Anonymity:
Geo-locating Nodes in Named Data Networking *
Alberto
Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Post-Quantum Forward Secure Onion Routing (Future Anonymity in Today's
Budget)
Satrajit Ghosh,
Aniket Kate
Scalable Divisible E-Cash
Sebatien Canard,
David Pointcheval, Oliviers Sanders, Jacques Traore
Recovering Lost Device-Bound Credentials
Foteini
Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann,
Gregory Neven
Analysis of Boomerang Differential Trails via a SAT-Based Constraint
Solver URSA
Aleksandar
Kircanski
Time-Memory Trade-off Attack on the GSM A5/1 Stream Cipher Using
Commodity GPGPU
Jiqiang Lu, Zhen
Li, Matt Henricksen
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom,
Gefei Li, Damith C. Ranasinghe
Cryptographic Enforcement of Information Flow Policies without Public
Information
Jason Crampton,
Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
A Fully Decentralized Data Usage Control Enforcement Infrastructure
Florian Kelbert,
Alexander Pretschner
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability
of Online Information
Milivoj
Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes,
Ninja Marnau, Peter Druschel
Exploiting Eye Tracking for Smartphone Authentication
Dachuan Liu, Bo
Dong, Xing Gao, Haining Wang
Optimal Proximity Proofs Revisited
Handan Kilinc,
Serge Vaudenay
Replacement Attacks: Automatically Impeding Behavior-based Malware
Specifications
Jiang Ming, Zhi
Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full
Size Encryption Exponents
Atsushi Takayasu,
Noboru Kunihiro
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen, Thomas
Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Arithmetic Addition over Boolean Masking, Towards First- and
Second-Order Resistance in Hardware
Tobias Schneider,
Amir Moradi, Tim Gneysu
Foundations of Reconfigurable PUFs
Jonas Schneider,
Dominique Schrder
mrPUF: A Novel Memristive Device Based Physical Unclonable Function
Yansong Gao,
Damith C. Ranasinghe, Omid Kavehei, Said F. Al-Sarawi, Derek Abbott
On the XOR of Multiple Random Permutations
Bart Mennink,
Bart Preneel
Robust Pseudo-Random Number Generators with Input Secure Against
Side-Channel Attacks
Michel Abdalla,
Sonia Belad, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
Leakage-Resilient Cryptography over Large Finite Fields: Theory and
Practice
Marcin
Andrychowicz, Daniel Masny, Edoardo Persichetti
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak
Sources
Michael Backes,
Aniket Kate, Sebastian Meiser, Tim Ruffing
Automatic Protocol Selection in Secure Two-Party
Computations
Florian
Kerschbaum, Thomas Schneider, Axel Schropfer
On the Security of the Algebraic
Eraser Tag Authentication Protocol
Simon R. Blackburn, M.J.B. Robshaw
A Cryptographic Analysis of
UMTS/LTE AKA
Stephanie Alt,
Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin
Richard
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication
Token
Ian Goldberg,
Graeme Jenkinson, Frank Stajano
Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon,
Marjan Škrobot, Qiang Tang
Hash-Based TPM Signatures for the Quantum World
Megumi Ando,
Joshua D. Guttman, Alberto R. Papaleo, John Scire
Fuzzy Signatures: Relaxing Requirements and a New Construction
Takahiro Matsuda,
Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
Foundations of Fully Dynamic Group Signatures
Jonathan Bootle,
Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
A Lattice-Based Group Signature Scheme with Message-Dependent Opening
Benoît
Libert, Fabrice Mouhartem, Khoa Nguyen
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin
Wallet Security
Rosario Gennaro,
Steven Goldfeder, Arvind Narayanan
Legally Fair Contract Signing Without Keystones
Houda Ferradi,
Rémi Géraud, Diana Maimuț, David Naccache, David
Pointcheval
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android
Platforms
Ryan Johnson,
Mohamed Elsabagh, Angelos Stavrou
Network Anomaly Detection Using Unsupervised Feature Selection and
Density Peak Clustering
Xiejun Ni, Daojing
He, Sammy Chan, Farooq Ahmad
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
Attribute Based Encryption with Direct Efficiency Tradeoff
Nuttapong
Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya,
Shota Yamada
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption
for Bounded Functions
Xavier Boyen,
Qinyi Li
Offline Witness Encryption
Hamza Abusalah,
Georg Fuchsbauer, Krzysztof Pietrzak
Deterministic Public-Key Encryption Under Continual Leakage
Venkata Koppula,
Omkant Pandey, Yannis Rouselakis, Brent Waters
Better Preprocessing for Secure Multiparty Computation
Carsten Baum,
Ivan Damgård, Tomas Toft, Rasmus Zakarias
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable
Computation
Berry
Schoenmakers, Meilof Veeningen, Niels de Vreede
Verifiable Multi-party Computation with Perfectly Private Audit Trail
Édouard
Cuvelier, Olivier Pereira
Practical Fault-Tolerant Data Aggregation
Krzysztof Grining,
Marek Klonowski, Piotr Syga
Accelerating Homomorphic Computations on Rational Numbers
Angela
Jäschke, Frederik Armknecht
New Techniques for Non-interactive Shuffle and Range Arguments
Alonso
González, Carla Ráfols
Constrained PRFs for Unbounded Inputs with Short Keys
Hamza Abusalah,
Georg Fuchsbauer
Wide Trail Design Strategy for Binary MixColumns: Enhancing Lower Bound
of Number of Active S-boxes
Yosuke Todo,
Kazumaro Aoki
Automatic Search of Linear Trails in ARX with Applications to SPECK and
Chaskey
Yunwen Liu,
Qingju Wang, Vincent Rijmen
Square Attack on 7-Round Kiasu-BC
Christoph
Dobraunig, Maria Eichlseder, Florian Mendel
On the Design Rationale of SIMON Block Cipher: Integral Attacks and
Impossible Differential Attacks against SIMON Variants
Kota Kondo, Yu
Sasaki, Tetsu Iwata
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to
Practice
Alex Biryukov,
Daniel Dinu, Johann Großschädl
Assisted Identification of Mode of Operation in Binary Code with
Dynamic Data Flow Slicing
Pierre
Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
Parallel Implementation of BDD
Enumeration for LWE *
Elena Kirshanova,
Alexander May, Friedrich Wiemer
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
Thomas Gougeon,
Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery
Mauro Conti,
Claudio Guarisco, Riccardo Spolaor
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock
Patterns on Smartphones
Weizhi Meng,
Wenjuan Li, Duncan S. Wong, Jianying Zhou
Gesture-Based Continuous Authentication for Wearable Devices: The Smart
Glasses Use Case
Jagmohan Chauhan,
Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar
Sampling from Arbitrary Centered
Discrete Gaussians for Lattice-Based Cryptography *
Carlos Aguilar-Melchor, Martin R.
Albrecht, Thomas Ricosset
Simple Security Definitions for and Constructions of 0-RTT Key
Exchange
Britta Hale, Tibor
Jager, Sebastian Lauer, Jörg Schwenk
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on
Threshold OPRF
Stanisław
Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
Secure and Efficient Pairing at 256-Bit Security Level
Yutaro Kiyomura,
Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro
Kobayash
No Free Charge Theorem: A Covert Channel via USB Charging Cable on
Mobile Devices
Riccardo Spolaor,
Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran
Are You Lying: Validating the Time-Location of Outdoor Images
Xiaopeng Li,
Wenyuan Xu, Song Wang, Xianshan Qu
Lights, Camera, Action! Exploring Effects of Visual Distractions on
Completion of Security Tasks
Bruce Berg, Tyler
Kaczmarek, Alfred Kobsa, Gene Tsudik
A Pilot Study of Multiple Password Interference Between Text and
Map-Based Passwords
Weizhi Meng,
Wenjuan Li, Wang Hao Lee, Lijun Jiang, Jianying Zhou
Hierarchical Key Assignment with Dynamic Read-Write Privilege
Enforcement and Extended KI-Security
Yi-Ruei Chen,
Wen-Guey Tzeng
A Novel GPU-Based Implementation of the Cube Attack: Preliminary
Results Against Trivium
Marco Cianfriglia,
Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele,
Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng
Sim, Gaoli Wang
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables
Marcel Keller,
Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez,
Srinivas Vivek
An Experimental Study of the BDD Approach for the Search LWE Problem
Rui Xu, Sze Ling
Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku
Kiyomoto, Matt Henricksen
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption
Akshayaram
Srinivasan, Chandrasekaran Pandu Rangan
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
San Ling, Khoa
Nguyen, Huaxiong Wang, Yanhong Xu
Breaking and Fixing Mobile App Authentication with OAuth2.0-based
Protocols
Ronghai Yang,
Wing Cheong Lau, Shangcheng Shi
Adaptive Proofs Have Straightline Extractors (in the Random Oracle
Model)
David Bernhard,
Ngoc Khanh Nguyen, Bogdan Warinschi
More Efficient Construction of Bounded KDM Secure Encryption
Kaoru Kurosawa,
Rie Habuka
Signature Schemes with Randomized Verification
Cody Freitag,
Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki
Okamoto, Jordan Tran, Brent Waters
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel
Resilience
Claude Carlet,
Annelie Heuser, Stjepan Picek
A Practical Chosen Message Power Analysis Approach Against Ciphers with
the Key Whitening Layers
Chenyang Tu,
Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
Side-Channel Attacks Meet Secure Network Protocols
Alex Biryukov,
Daniel Dinu, Yann Le Corre
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature
Schemes
Dan Boneh, Sam
Kim, Valeria Nikolaenko
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W.F. Lai,
Sherman S.M. Chow
Bounds in Various Generalized Settings of the Discrete Logarithm
Problem .
Jason H.M. Ying,
Noboru Kunihiro
An Enhanced Binary Characteristic Set Algorithm and Its Applications to
Algebraic Cryptanalysis
Sze Ling Yeo,
Zhen Li, Khoongming Khoo, Yu Bin Low
SCRAPE: Scalable Randomness Attested by Public Entities
Ignacio Cascudo,
Bernardo David
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
David Chaum,
Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De
Ruiter, Alan T. Sherman
Almost Optimal Oblivious Transfer from QA-NIZK
Olivier Blazy,
Céline Chevalier, Paul Germouty
OnionPIR: Effective Protection of Sensitive Metadata in Online
Communication Networks
Daniel Demmler,
Marco Holz, Thomas Schneider
Accountable Storage
Giuseppe
Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos
Papamanthou, Evripidis Paraskevas, Roberto Tamassia
Maliciously Secure Multi-Client ORAM
Matteo Maffei,
Giulio Malavolta, Manuel Reinert, Dominique Schröder
Legacy-Compliant Data Authentication for Industrial Control System
Traffic
John Henry
Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín
Ochoa
Multi-client Oblivious RAM Secure Against Malicious Servers
Erik-Oliver
Blass, Travis Mayberry, Guevara Noubir
A
Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling, Kenneth G. Paterson
Distributed SSH Key Management with
Proactive RSA Threshold
Signatures
Yotam Harchol, Ittai Abraham, Benny Pinkas
Non-interactive Zaps of Knowledge *
Georg Fuchsbauer,
Michele Orrù
Formal Verification of Side-Channel Countermeasures via
Elementary Circuit Transformations
Jean-Sébastien
Coron
Drive-By Key-Extraction Cache Attacks from Portable Code
Daniel Genkin,
Lev Pachmanov, Eran Tromer, Yuval Yarom
On the Ineffectiveness of Internal Encodings - Revisiting the DCA
Attack on White-Box Cryptography
Estuardo Alpirez
Bock, Chris Brzuska, Wil Michiels, Alexander Treff
Continuously Non-malleable Codes with Split-State Refresh
Antonio Faonio,
Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
Efficient Unconditionally Secure Signatures Using Universal Hashing
Ryan Amiri,
Aysajan Abidin, Petros Wallden, Erika Andersson
Floppy-Sized Group Signatures from Lattices
Cecilia Boschini,
Jan Camenisch, Gregory Neven
On the Security Notions for Homomorphic Signatures
Dario Catalano,
Dario Fiore, Luca Nizzardo
Invisible Sanitizable Signatures and Public-Key Encryption are
Equivalent
Marc Fischlin,
Patrick Harasser
Delegatable Attribute-Based Anonymous Credentials from Dynamically
Malleable Signatures
Johannes
Blömer, Jan Bobolz
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
Encryption
Irene Giacomelli,
Somesh Jha, Marc Joye, David Page, Kyonghwan Yoon
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs
Sébastien
Canard, David Pointcheval, Quentin Santos, Jacques Traoré
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli,
Emiliano De Cristofaro, Claudio Soriente
New Protocols for Secure Equality Test and Comparison
Geoffroy Couteau
Minimising Communication in Honest-Majority MPC by Batchwise
Multiplication Verification
Peter Sebastian
Nordholt, Meilof Veeningen
Best of Both Worlds in Secure Computation, with Low Communication
Overhead
Daniel Genkin, S.
Dov Gordon, Samuel Ranellucci
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki, Boyang Wei
MergeMAC: A MAC for Authentication with Strict Time Constraints and
Limited Bandwidth
Ralph Ankele,
Florian Böhl, Simon Friedberger
KangarooTwelve: Fast Hashing Based on KECCAK-p
Guido Bertoni,
Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer,
Benoît Viguier
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher
Yu Sasaki
Generic Round-Function-Recovery Attacks for Feistel Networks over Small
Domains
Betül Durak,
Serge Vaudenay
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele, Eik
List
Can Caesar Beat Galois? Robustness of CAESAR Candidates Against Nonce
Reusing and High Data Complexity Attacks
Serge Vaudenay,
Damian Vizár
Improved Anonymous Broadcast Encryptions: Tight Security and Shorter
Ciphertext
Jiangtao Li,
Junqing Gong
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based
Encryption with Short Revocation List
Joseph K. Liu,
Tsz Hon Yuen, Peng Zhang, Kaitai Liang
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption
on Lattices
Xavier Boyen,
Qinyi Li
In-Region Authentication
Mamunur Rashid
Akand, Reihaneh Safavi-Naini
Formal Analysis of Distance Bounding with Secure Hardware
Handan
Kılınç, Serge Vaudenay
KRB-CCN: Lightweight Authentication and Access Control for Private
Content-Centric Networks
Ivan O. Nunes,
Gene Tsudik
Assentication: User De-authentication and Lunchtime Attack Mitigation
with Seated Posture Biometric
Tyler Kaczmarek,
Ercan Ozturk, Gene Tsudik
Stateful Multi-client Verifiable Computation
Christian Cachin,
Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
VeriCount: Verifiable Resource Accounting Using Hardware and Software
Isolation
Shruti Tople,
Soyeon Park, Min Suk Kang, Prateek Saxena
Message-Locked Encryption with File Update
Suyash Kandele,
Souradyuti Paul
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring
Seny Kamara,
Alptekin Küpçü
Rate-Optimizing Compilers for Continuously Non-malleable Codes
Sandro Coretti,
Antonio Faonio, Daniele Venturi
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End
Encryption
Jens Müller, Marcus Brinkmann, Damian
Poddebniak, Sebastian Schinzel, Jörg Schwenk
Cryptanalysis of ForkAES
Subhadeep Banik,
Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier,
Mostafizar Rahman, Dhiman Saha, Yu Sasaki
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring
Signatures
Muhammed F.
Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
Hierarchical Attribute-Based Signatures: Short Keys and Optimal
Signature Length
Daniel Gardham,
Mark Manulis
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu, Man Ho
Au, Zhenfei Zhang
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the
Birthday Bound
Alexander Moch,
Eik List
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping
Xiaoyang Cheng,
Yan Lin, Debin Gao, Chunfu Jia
Hide and Seek: An Architecture for Improving Attack-Visibility in
Industrial Control Systems
Jairo Giraldo,
David Urbina, Alvaro A. Cardenas, Nils Ole Tippenhauer
A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS
John Henry
Castellanos, Jianying Zhou
PassGAN: A Deep Learning Approach for Password Guessing
Briland Hitaj,
Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz
Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding
for Rational and Uncooperative Miners
Sang-Yoon Chang,
Younghee Park, Simeon Wuthier, Chang-Wu Chen
Longitudinal Analysis of Misuse of Bitcoin
Karim Eldefrawy,
Ashish Gehani, Alexandre Matton
Faster Multiplication in Z2m
[x] on Cortex-M4 to Speed up NIST PQC Candidates *
Matthias J. Kannwischer, Joost Rijneveld, Peter
Schwabe
Generic and Practical Key
Establishment from Lattice *
Zhengzhong Jin,
Yunlei Zhao
One Sample Ring-LWE with Rounding and Its Application to Key Exchange
Jintai Ding,
Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore,
Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
Proxy Re-Encryption and Re-Signatures
from Lattices
Xiong Fan,
Feng-Hao Liu
DL-Extractable UC-Commitment Schemes
Behzad
Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
A New Encoding Framework for Predicate Encryption with Non-linear
Structures in Prime Order Groups
Jongkil Kim,
Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
Unbounded Inner-Product Functional Encryption with Succinct Keys
Edouard
Dufour-Sans, David Pointcheval
Password-Authenticated Public-Key Encryption
Tatiana Bradley,
Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
Public Immunization Against Complete Subversion Without Random Oracles
Giuseppe Ateniese,
Danilo Francati, Bernardo Magri, Daniele Venturi
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System
Shi-Feng Sun,
Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph Liu
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly,
Nigel P. Smart
Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function
Dependent Preprocessing
Aner Ben-Efraim,
Michael Nielsen, Eran Omri
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu, Mark
Manulis
Masking Fuzzy-Searchable Public Databases
Alexandra
Boldyreva, Tianxin Tang, Bogdan Warinschi
Homomorphic Training of 30,000 Logistic Regression Models
Flavio
Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
Communication-Efficient Proactive Secret Sharing for Dynamic Groups
with Dishonest Majorities
Karim Eldefrawy, Tancrède Lepoint, Antonin
Leroux
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
Secure and Efficient Delegation of Elliptic-Curve Pairing
Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram
Kahrobaei, Vladimir Shpilrain
Tweaking Key-Alternating Feistel Block Ciphers
Hailun Yan, Lei
Wang, Yaobin Shen, Xuejia Lai
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New
PRF Mode
Shoichi Hirose,
Yu Sasaki, Hirotaka Yoshida
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector
Arithmetic
Hilder Vitor Lima
Pereira
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
Huy Quoc Le, Dung
Hoang Duong, Willy Susilo, Josef Pieprzyk
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva, Tomer Ashur, Vincent Rijmen
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh, David Jao, Brian Koziel, Jason T.
LeGrow, Vladimir Soukharev, Oleg Taraskin
ACE in Chains: How Risky Is CBC Encryption of Binary Executable
Files?
Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
Classical Misuse Attacks on NIST Round 2 PQC
Loïs Huguenin-Dumittan, Serge Vaudenay
Offline Witness Encryption with Semi-adaptive Security
Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Efficient Anonymous Multi-group Broadcast Encryption
Intae Kim, Seong Oun Hwang, Willy Susilo, Joonsang
Baek, Jongkil Kim
Improving the Efficiency of Re-randomizable and Replayable CCA
Secure Public Key Encryption
Antonio Faonio, Dario Fiore
New Methods and Abstractions for RSA-Based Forward Secure
Signatures
Susan Hohenberger, Brent Waters
Minting Mechanism for Proof of Stake Blockchains
Dominic Deuber,
Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda
Krishnan Thyagarajan
Timed Signatures and Zero-Knowledge Proofs — Timestamping in the
Blockchain Era
Aydin Abadi,
Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
An Efficient Secure Division Protocol Using Approximate Multi-bit
Product and New Constant-Round Building Blocks
Keitaro Hiwatashi,
Satsuya Ohata, Koji Nuida
Improved Building Blocks for Secure Multi-party Computation Based on
Secret Sharing with Honest Majority
Marina Blanton,
Ahreum Kang, Chen Yuan
A Practical Approach to the Secure Computation of the Moore–Penrose
Pseudoinverse over the Rationals
Niek J. Bouman,
Niels de Vreede
Saber on ESP32
Bin Wang, Xiaozhuo
Gu, Yingshan Yang
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim, Paulo
S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa,
Jefferson E. Ricardini
Secure Two-Party Computation in a Quantum World
Niklas
Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan
Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas
Schneider, Patrick Struck
Further Optimizations of CSIDH: A Systematic Approach to Efficient
Strategies, Permutations, and Bound Vectors
Aaron Hutchinson,
Jason LeGrow, Brian Koziel, Reza Azarderakhsh
A Breach into the Authentication with Built-in Camera (ABC) Protocol
Cezara Benegui,
Radu Tudor Ionescu
A Practical System for Privacy-Preserving Video Surveillance
Elmahdi Bentafat,
M. Mazhar Rathore, Spiridon Bakiras
Biometric-Authenticated Searchable Encryption
Daniel Gardham,
Mark Manulis, Constantin Cătălin Drăgan
BioLocker: A Practical Biometric Authentication Mechanism Based on 3D
Fingervein
F. Betül
Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
Accelerating Forward and Backward Private Searchable Encryption Using
Trusted Execution
Viet Vo, Shangqi
Lai, Xingliang Yuan, Shi-Feng Sun, Surya Nepal, Joseph K. Liu
Cluster-Based Anonymization of Knowledge Graphs
Anh-Tu Hoang,
Barbara Carminati, Elena Ferrari
Same Point Composable and Nonmalleable Obfuscated Point Functions
Peter Fenteany,
Benjamin Fuller
A Concise Bounded Anonymous Broadcast Yielding Combinatorial
Trace-and-Revoke Schemes
Xuan Thanh Do,
Duong Hieu Phan, Moti Yung
Multi-Device for Signal
Sébastien
Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas,
Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
Powerless Security: A Security Analysis of In-Home Power Line
Communications Based on HomePlug AV2
Stefan Hoffmann,
Jens Müller, Jörg Schwenk, Gerd Bumiller
Watching the Weak Link into Your Home: An Inspection and Monitoring
Toolkit for TR-069
Maximilian Hils,
Rainer Böhme
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Fabio De Gaspari,
Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini
Quality Evaluation of Cyber Threat Intelligence Feeds
Harm Griffioen,
Tim Booij, Christian Doerr
Game Theory-Based Approach for Defense Against APTs
Juan E. Rubio,
Cristina Alcaraz, Javier Lopez
MemShield: GPU-Assisted Software Memory Encryption
Pierpaolo
Santucci, Emiliano Ingrassia, Giulio Picierro, Marco Cesati
Super Root: A New Stealthy Rooting Technique on ARM Devices
Zhangkai Zhang,
Yueqiang Cheng, Zhoujun Li
Towards Automated Augmentation and Instrumentation of Legacy
Cryptographic Executables
Karim Eldefrawy,
Michael Locasto, Norrathep Rattanavipanon, Hassen Saidi
When TLS Meets Proxy on Mobile
*
Joyanta Debnath,
Sze Yiu Chau, Omar Chowdhury
Human Factors in Homograph Attack Recognition
Tran Phuong Thao,
Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota, Tran
Van Sang, Rie Shigetomi Yamaguchi
Publicly Evaluatable Perceptual Hashing
Rosario Gennaro,
David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, William E. Skeith,
Anastasiia Timashova
TrollThrottle — Raising the Cost of Astroturfing
Ilkan Esiyok,
Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes
* Best student paper award.
Maintained
by Jianying
Zhou
Last updated in
September
2020