ACNS
 
International Conference on
Applied Cryptography and Network Security

List of Accepted Papers - Academic Track (2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016]

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
    Ventzislav Nikov, Svetla Nikova, Bart Preneel

Optimized χ2-Attack against RC6
    Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji

Anonymity-Enhanced Pseudonym System
    Yuko Tamura, Atsuko Miyaji

Using Feedback to Improve Masquerade Detection *
    Kwong H. Yung

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
    Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun

An IP Traceback Scheme Integrating DPM and PPM
    Fan Min, Jun-yan Zhang, Guo-wie Yang

Improved Scalable Hash Chain Traversal
    Sung-Ryul Kim

Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
    Rui Zhang, Hideki Imai

On the Security of Two Threshold Signature Schemes with Traceable Signers
    Guilin Wang, Xiaoxi Han, Bo Zhu

Proxy and Threshold One-Time Signatures
    Mohamed Al-Ibrahim, Anton Cerny

A Threshold GQ Signature Scheme
    Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng

Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
    Gene Itkis, Peng Xie

A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
    Chong-zhi Gao, Zheng-an Yao, Lei Li

Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
    Ching Lin, Vijay Varadharajan

An Authorization Model for E-consent Requirement in a Health Care Application
    Chun Ruan, Vijay Varadharajan

PLI: A New Framework to Protect Digital Content for P2P Networks
    Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang

Improved Algebraic Traitor Tracing Scheme
    Chunyan Bai, Guiliang Feng

Common Vulnerability Markup Language
    Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang

Trust on Web Browser: Attack vs. Defense
    Tie-Yan Li, Yongdong Wu

Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
    Luciano Rila, Chris J. Mitchell

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
    Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park

Using OCSP to Secure Certificate-Using Transactions in M-commerce
    Jose L. Munoz, Jordi Forne, Oscar Esparza, Bernabe Miguel Soriano

Differential Fault Analysis on AES
    Pierre Dusart, Gilles Letourneux, Olivier Vivolo

Side-Channel Attack on Substitution Blocks
    Roman Novak

Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation
    Yasuyuki Sakai, Kouichi Sakurai

A Fast Correlation Attack for LFSR-Based Stream Ciphers
    Sarbani Palit, Bimal K. Roy, Arindom De

Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient
    Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng

An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu

A Key Recovery Mechanism for Reliable Group Key Management
    Taenam Cho, Sang-Ho Lee

Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model
    Sandeepan Chowdhury, Subhamoy Maitra

Efficient Distributed Signcryption Scheme as Group Signcryption
    DongJin Kwak, SangJae Moon

Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
    Johann Großschadl, Guy-Armand Kamendje


CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
    Michael E. Locasto, Angelos D. Keromytis

Private Keyword-Based Push and Pull with Applications to Anonymous Communication
    Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Song, Ke Yang

Secure Conjunctive Keyword Search over Encrypted Data
    Philippe Golle, Jessica Staddon, Brent Waters

Evaluating Security of Voting Schemes in the Universal Composability Framework
*
    Jens Groth

Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
    Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa

On the Security of Cryptosystems with All-or-Nothing Transform
    Rui Zhang, Goichiro Hanaoka, Hideki Imai

Centralized Management of Virtual Security Zones in IP Networks
    Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen

S-RIP: A Secure Distance Vector Routing Protocol
    Tao Wan, Evangelos Kranakis, Paul C. van Oorschot

A Pay-per-Use DoS Protection Mechanism for the Web
    Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein

Limited Verifier Signature from Bilinear Pairings
    Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim

Deniable Ring Authentication Revisited
    Willy Susilo, Yi Mu

A Fully-Functional Group Signature Scheme over Only Known-Order Group
    Atsuko Miyaji, Kozue Umeda

Some Observations on Zap and Its Applications
    Yunlei Zhao, C.H. Lee, Yiming Zhao, Hong Zhu

Security Measurements of Steganographic Systems
*
    Weiming Zhang, Shiqu Li

X2Rep: Enhanced Trust Semantics for the XRep Protocol
    Nathan Curtis, Rei Safavi-Naini, Willy Susilo

One-Round Protocols for Two-Party Authenticated Key Exchange
    Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee

Password Authenticated Key Exchange Using Quadratic Residues
    Muxiang Zhang

Key Agreement Using Statically Keyed Authenticators
    Colin Boyd, Wenbo Mao, Kenneth G. Paterson

Low-Latency Cryptographic Protection for SCADA Communications
    Andrew K. Wright, John A. Kinast, Joe McCarty

A Best Practice for Root CA Key Update in PKI
    InKyoung Jeun, Jongwook Park, TaeKyu Choi, SangWan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin

SQLrand: Preventing SQL Injection Attacks
    Stephen W. Boyd, Angelos D. Keromytis

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem
    Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao

Success Probability in χ2-Attacks
    Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano

More Generalized Clock-Controlled Alternating Step Generator
    Ali A. Kanso

FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy
    Daisuke Inoue, Masahiro Kuroda

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model
    Anderson C.A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
    Bok-Min Goi, Raphael C.-W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M.U. Siddiqi

Security Analysis of CRT-Based Cryptosystems
    Katsuyuki Okeya, Tsuyoshi Takagi

Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits
    Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung

Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
    Shuhong Wang, Jie Wang, Maozhi Xu

Advanced Packet Marking Mechanism with Pushback for IP Traceback
    Hyung-Woo Lee

A Parallel Intrusion Detection System for High-Speed Networks
    Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li

A Novel Framework for Alert Correlation and Understanding
    Dong Yu, Deborah Frincke

An Improved Algorithm for uP + vQ Using JSF13
    BaiJie Kuang, YueFei Zhu, YaJuan Zhang

New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn)
    Palash Sarkar, Pradeep Kumar Mishra, Rana Barua

Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
    Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee


Two-Server Password-Only Authenticated Key Exchange
    Jonathan Katz, Philip MacKenzie, Gelareh Taban, Virgil Gligor

Strengthening Password-Based Authentication Protocols
Against Online Dictionary Attacks
    Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon

Cryptanalysis of an Improved Client-to-Client Password-Authenticated
Key Exchange (C2C-PAKE) Scheme
    Raphael C.-W. Phan, Bok-Min Goi

Efficient Security Mechanisms
for Overlay Multicast-Based Content Distribution
    Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia

A Traitor Tracing Scheme Based on RSA for Fast Decryption

    John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee

N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords

    Jin Wook Byun, Dong Hoon Lee

Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records

    Virgil Griffith, Markus Jakobsson

Mitigating Network Denial-of-Service
Through Diversity-Based Traffic Management
    Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji

Searching for High-Value Rare Events with Uncheatable Grid Computing

    Wenliang Du, Michael T. Goodrich

Digital Signatures Do Not Guarantee Exclusive Ownership

    Thomas Pornin, Julien P. Stern

Thompson’s Group and Public Key Cryptography

    Vladimir Shpilrain, Alexander Ushakov

Rainbow, a New Multivariable Polynomial Signature Scheme
    Jintai Ding, Dieter Schmidt

Badger – A Fast and Provably Secure MAC

    Martin Boesgaard, Thomas Christensen, Erik Zenner

IDS False Alarm Reduction Using Continuous and Discontinuous Patterns

    Abdulrahman Alharby, Hideki Imai

Indexing Information for Data Forensics
    Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia

Model Generalization and Its Implications on Intrusion Detection
    Zhuowei Li, Amitabha Das, Jianying Zhou

Intrusion-Resilient Secure Channels

    Gene Itkis, Robert McNerney Jr., Scott Russell

Optimal Asymmetric Encryption and Signature Paddings
    Benoıt Chevallier-Mames, Duong Hieu Phan, David Pointcheval

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
    SeongHan Shin, Kazukuni Kobara, Hideki Imai

Identity Based Encryption Without Redundancy
    Benoıt Libert, Jean-Jacques Quisquater

OACerts: Oblivious Attribute Certificates

    Jiangtao Li, Ninghui Li

Dynamic k-Times Anonymous Authentication

    Lan Nguyen, Rei Safavi-Naini

Efficient Anonymous Roaming and Its Security Analysis
    Guomin Yang, Duncan S. Wong, Xiaotie Deng

Quantifying Security in Hybrid Cellular Networks

    Markus Jakobsson, Liu Yang

Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
    Flavio D. Garcia, Jaap-Henk Hoepman

Building Reliable Mix Networks with Fair Exchange
    Michael K. Reiter, XiaoFeng Wang, Matthew Wright

SCARE of the DES (Side Channel Analysis for Reverse Engineering of the Data Encryption Standard)
    Remy Daudigny, Herve Ledig, Frederic Muller, Frederic Valette

Robust Key Extraction from Physical Uncloneable Functions
    B. Skoric, P. Tuyls, W. Ophey

Efficient Constructions for One-Way Hash Chains
    Yih-Chun Hu, Markus Jakobsson, Adrian Perrig

Privacy Preserving Keyword Searches on Remote Encrypted Data
    Yan-Cheng Chang, Michael Mitzenmacher

An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
    Hsiao-Ying Lin, Wen-Guey Tzeng

Non-interactive Zero-Knowledge Arguments for Voting
    Jens Groth

Short Signature and Universal Designated Verifier Signature
Without Random Oracles
    Rui Zhang, Jun Furukawa, Hideki Imai

Efficient Identity Based Ring Signature
    Sherman S.M. Chow, Siu-Ming Yiu, Lucas C.K. Hui

New Signature Schemes with Coupons and Tight Reduction
    Benoıt Chevallier-Mames


Adaptive Detection of Local Scanners *
    Ahren Studer, Chenxi Wang

Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection
    Jianhua Yang, Yongzhong Zhang

DSO: Dependable Signing Overlay
    Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas Blough

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
    Ahto Buldas, Sven Laur

A Handy Multi-coupon System
    Sebastien Canard, Aline Gouget, Emeline Hufschmitt

An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
    Dongvu Tonien, Reihaneh Safavi-Naini

Efficient Memory Bound Puzzles Using Pattern Databases
    Sujata Doshi, Fabian Monrose, Aviel D. Rubin

Effect of Malicious Synchronization
    Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam

Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
    Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos

Password Based Server Aided Key Exchange
    Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks
    Qiang Tang, Kim-Kwang Raymond Choo

Stateful Subset Cover
    Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm

The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
    Khoongming Khoo, Guang Gong, Hian-Kiat Lee

Breaking a New Instance of TTM Cryptosystems
    Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding

Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
    Raphael C.-W. Phan, Bok-Min Goi

An AES Smart Card Implementation Resistant to Power Analysis Attacks
    Christoph Herbst, Elisabeth Oswald, Stefan Mangard

Physical Security Bounds Against Tampering
    Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi

Flexible Exponentiation with Resistance to Side Channel Attacks
    Camille Vuillaume, Katsuyuki Okeya

An Improved Poly1305 MAC
    Dayin Wang, Dongdai Lin, Wenling Wu

Certificateless Public-Key Signature: Security Model and Efficient Construction
    Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
    Chetan Nanjunda Mathur, Karthik Narayan, K.P. Subbalakshmi

Authentication for Paranoids: Multi-party Secret Handshakes
   Stanislaw Jarecki, Jihye Kim, Gene Tsudik

On the Security of the Authentication Module of Chinese WLAN
Standard Implementation Plan
    Xinghua Li, SangJae Moon, Jianfeng Ma

W3Bcrypt: Encryption as a Stylesheet
    Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis

Combinatorial Structures for Design of Wireless Sensor Networks
    Dibyendu Chakrabarti, Jennifer Seberry

Public Key Cryptography Sans Certificates in Ad Hoc Networks
*
    Nitesh Saxena

Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks
    JongHyup Lee, Taekyoung Kwon, Jooseok Song

A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography
    Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal

Results on Almost Resilient Functions
    Pinhui Ke, Jie Zhang, Qiaoyan Wen

Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
    Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
    Mohamed A. Haleem, Chetan Nanjunda Mathur, R. Chandramouli, K.P. Subbalakshmi

Improving the Randomized Initial Point Countermeasure Against DPA
    Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka

Syntax-Driven Private Evaluation of Quantified Membership Queries
    Aggelos Kiayias, Antonina Mitrofanova


Generic Transformation to Strongly Unforgeable Signatures
    Qiong Huang, Duncan S. Wong, Yiming Zhao

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
    Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu

Merkle Signatures with Virtually Unlimited Signature Capacity
    Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume

Midpoints Versus Endpoints: From Protocols to Firewalls
*
    Diana von Bidder-Senn, David Basin, Germano Caronni

An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
    Liang Lu, Rei Safavi-Naini, Jeffrey Horton, Willy Susilo

Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
    Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng

Cryptanalysis of the TRMC-4 Public Key Cryptosystem
    Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
    Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen

A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA
    Bahador Bakhshi, Babak Sadeghiyan

Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
    Stefan Tillich, Christoph Herbst, Stefan Mangard

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
    Junghyun Nam, Juryon Paik, Ung Mo Kim, Dongho Won

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
    Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu

Bayesian Methods for Practical Traitor Tracing
    Philip Zigoris, Hongxia Jin

A New Protocol for Conditional Disclosure of Secrets and Its Applications
    Sven Laur, Helger Lipmaa

An Unconditionally Secure Protocol for Multi-Party Set Intersection
    Ronghua Li, Chuankun Wu

Privacy-Preserving Set Union
    Keith Frikken

Universal Accumulators with Efficient Nonmembership Proofs
    Jiangtao Li, Ninghui Li, Rui Xue

Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
    Stanislaw Jarecki, Xiaomin Liu

Identity-Based Proxy Re-encryption
    Matthew Green, Giuseppe Ateniese

A More Natural Way to Construct Identity-Based Identification Schemes
    Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang

Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
    Rui Zhang

Certified E-Mail Protocol in the ID-Based Setting
    Chunxiang Gu, Yuefei Zhu, Yonghui Zheng

Efficient Content Authentication in Peer-to-Peer Networks
    Roberto Tamassia, Nikos Triandopoulos

An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
    Fagen Li, Yupu Hu, Chuanrong Zhang

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
    Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay

BAP: Broadcast Authentication Using Cryptographic Puzzles
    Patrick Schaller, Srdjan Capkun, David Basin

Compressed XTR
    Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi

Sliding Window Method for NTRU
    Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park

Efficient Certificateless Signature Schemes
    Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee

Security Mediated Certificateless Signatures
    Wun-She Yap, Sherman S.M. Chow, Swee-Huay Heng, Bok-Min Goi

Gradually Convertible Undeniable Signatures
    Laila El Aimani, Damien Vergnaud


On the Effectiveness of Internal Patching Against File-Sharing Worms *
    Liang Xie, Hui Song, Suncun Zhu

Peeking Through the Cloud: DNS-Based Estimation and Its Applications

    Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos

Pushback for Overlay Networks: Protecting Against Malicious Insiders
    Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis

PPAA: Peer-to-Peer Anonymous Authentication
    Patrick P. Tsang, Sean W. Smith

Generic Constructions of Stateful Public Key Encryption and Their Applications
    Joonsang Baek, Jianying Zhou, Feng Bao

Traceable and Retrievable Identity-Based Encryption
    Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang

Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
    Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta

Attacking Reduced Round SHA-256
    Somitra Kumar Sanadhya, Palash Sarkar

Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
    Ivan B. Damgard, Lars R. Knudsen, Soren S. Thomsen

Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
    Yevgeniy Dodis, Prashant Puniya

Replay Attack in a Fair Exchange Protocol
    Macia Mut-Puigserver, Magdalena Payeras-Capella, Josep Lluis Ferrer-Gomila, Llorenc Huguet-Rotger

Improved Conditional E-Payments
    Marina Blanton

Anonymity in Transferable E-cash
    Sebastien Canard, Aline Gouget

Generic Security-Amplifying Methods of Ordinary Digital Signatures
    Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong

New Differential-Algebraic Attacks and Reparametrization of Rainbow
    Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng

Trapdoor Sanitizable Signatures and Their Application to Content Protection
    Sebastien Canard, Fabien Laguillaumie, Michel Milhau

Multi-factor Authenticated Key Exchange
    David Pointcheval, Sebastien Zimmer

Repelling Detour Attack Against Onions with Re-encryption
    Marek Klonowski, Miroslaw Kutylowski, Anna Lauks

Analysis of EAP-GPSK Authentication Protocol
    John C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov

Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
    Ramnath Prasad, Nitesh Saxena

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
    Ghaith Hammouri, Berk Sunar

An Authentication Scheme Based on the Twisted Conjugacy Problem
    Vladimir Shpilrain, Alexander Ushakov

Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
    Nikita Borisov, Soumyadeb Mitra

A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation
    Tong-Lee Lim, A. Lakshminarayanan, Vira Saksen

On the Security of the CCM Encryption Mode and of a Slight Variant
    Pierre-Alain Fouque, Gwenaelle Martinet, Frederic Valette, Sebastien Zimmer

wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm
    Brian King

A Very Compact “Perfectly Masked” S-Box for AES
    D. Canright, Lejla Batina

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
    Frank Stajano, Dan Cvrcek, Matt Lewis

Traceable Privacy of Recent Provably-Secure RFID Protocols
    Khaled Ouafi, Raphael C.-W. Phan

The Security of EPC Gen2 Compliant RFID Protocols
    Mike Burmester, Breno de Medeiros


Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
    Mark Manulis

Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
    Cas J.F. Cremers

Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior
    Nitesh Saxena, Md. Borhan Uddin

How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
    Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto

Novel Precomputation Schemes for Elliptic Curve Cryptosystems
    Patrick Longa, Catherine Gebotys

Practical Secure Evaluation of Semi-private Functions
    Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider

Secure Hamming Distance Based Computation and Its Applications
*
    Ayman Jarrous, Benny Pinkas

Efficient Robust Private Set Intersection
    Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
    Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou

An Efficient Identity-Based Online/Offline Encryption Scheme
    Joseph K. Liu, Jianying Zhou

Dual-Policy Attribute Based Encryption
    Nuttapong Attrapadung, Hideki Imai

Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
    Seiko Arita, Koji Tsurudome

Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
    Lei Liu, Songqing Chen

A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
    Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson

Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
    MoonShik Lee, Daegun Ma, MinJae Seo

Tracing and Revoking Pirate Rebroadcasts
    Aggelos Kiayias, Serdar Pehlivanoglu

Efficient Deniable Authentication for Signatures: Application to Machine-Readable Travel Document
    Jean Monnerat, Sylvain Pasini, Serge Vaudenay

Homomorphic MACs: MAC-Based Integrity for Network Coding
    Shweta Agrawal, Dan Boneh

Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
    Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo

Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
    Jorg Lenhard, Karsten Loesing, Guido Wirtz

Cryptanalysis of Twister
    Florian Mendel, Christian Rechberger, Martin Schlaffer

Cryptanalysis of CubeHash
    Eric Brier, Thomas Peyrin

Collision Attack on Boole
    Florian Mendel, Tomislav Nad, Martin Schlaffer

Integrity Protection for Revision Control
    Christian Cachin, Martin Geisler

Fragility of the Robust Security Network: 802.11 Denial of Service
    Martin Eian

Fast Packet Classification Using Condition Factorization
    Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan

Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
    Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte

Broadcast Attacks against Lattice-Based Cryptosystems
    Thomas Plantard, Willy Susilo

Partial Key Exposure Attack on CRT-RSA
    Santanu Sarkar, Subhamoy Maitra

How to Compare Profiled Side-Channel Attacks?
    Francois-Xavier Standaert, Francois Koeune, Werner Schindler

Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
    Emmanuel Prouff, Matthieu Rivain

Attacking ECDSA-Enabled RFID Devices
    Michael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer


On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption *
    Aurelie Bauer, Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud

How to Construct Interval Encryption from Binary Tree Encryption
    Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
    Xavier Boyen, Brent Waters

Trapdoor Sanitizable Signatures Made Easy
    Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
    Markus Ruckert, Michael Schneider, Dominique Schroder

Redactable Signatures for Tree-Structured Data: Definitions and Constructions
    Christina Brzuska, Heike Busch, Oezguer Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser,
    Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schroder

Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
    Yuechuan Wei, Ping Li, Bing Sun, Chao Li

Multi-trail Statistical Saturation Attacks
    Baudoin Collard, Francois-Xavier Standaert

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW
3G
    Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang

High Performance GHASH Function for Long Messages
    Nicolas Meloni, Christophe Negre, M. Anwar Hasan

Principles on the Security of AES against First and Second-Order Differential Power Analysis
    Jiqiang Lu, Jing Pan, Jerry den Hartog

Adaptive Chosen-Message Side-Channel Attacks
    Nicolas Veyrat-Charvillon, Francois-Xavier Standaert

Secure Multiplicative Masking of Power Functions
    Laurie Genelle, Emmanuel Prouff, Michael Quisquater

Batch Groth–Sahai
    Olivier Blazy, Georg Fuchsbauer, Malika Izabachene, Amandine Jambert, Herve Sibert, Damien Vergnaud

Efficient and Secure Evaluation of Multivariate Polynomials and Applications
    Matthew Franklin, Payman Mohassel

Efficient Implementation of the Orlandi Protocol
    Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen

Improving the Round Complexity of Traitor Tracing Schemes
    Aggelos Kiayias, Serdar Pehlivanoglu

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters
    Julien Bringer, Herve Chabanne, Thomas Icart

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
    Rosario Gennaro, Hugo Krawczyk, Tal Rabin

Deniable Internet Key Exchange
    Andrew C. Yao, Yunlei Zhao

A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
    Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang

Secure Sketch for Multiple Secrets
    Chengfang Fang, Qiming Li, Ee-Chien Chang

A Message Recognition Protocol Based on Standard Assumptions
    Atefeh Mashatan, Serge Vaudenay

Affiliation-Hiding Key Exchange with Untrusted Group Authorities
    Mark Manulis, Bertram Poettering, Gene Tsudik

Privacy-Preserving Group Discovery with Linear Complexity
    Mark Manulis, Benny Pinkas, Bertram Poettering

Two New Efficient PIR-Writing Protocols
    Helger Lipmaa, Bingsheng Zhang

Regulatory Compliant Oblivious RAM
    Bogdan Carbunar, Radu Sion

Revisiting Unpredictability-Based RFID Privacy Models
    Junzuo Lai, Robert H. Deng, Yingjiu Li

On RFID Privacy with Mutual Authentication and Tag Corruption
    Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
    Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi Sandhu

COP: A Step toward Children Online Privacy
    Wei Xu, Sencun Zhu, Heng Xu

A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
    Xuhua Ding


Inferring Protocol State Machine from Network Traces: A Probabilistic Approach
    Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo

A Specification Based Intrusion Detection Framework for Mobile Phones
    Ashwin Chaugule, Zhi Xu, Sencun Zhu

Misuse Detection in Consent-Based Networks
    Mansoor Alicherry, Angelos D. Keromytis

Cold Boot Key Recovery by Solving Polynomial Systems with Noise
    Martin Albrecht, Carlos Cid

Exponent Blinding Does not Always Lift (Partial) Spa Resistance to Higher-Level Security
    Werner Schindler, Kouichi Itoh

Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
    Alex Biryukov, Ilya Kizhvatov, Bin Zhang

Cache Timing Analysis of RC4
    Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications
    Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung

Private Discovery of Common Social Contacts
    Emiliano De Cristofaro, Mark Manulis, Bertram Poettering

Sanitizable Signatures in XML Signature — Performance, Mixing Properties, and Revisiting the Property of Transparency
    Henrich C. Pohls, Kai Samelin, Joachim Posegga

Double-Trapdoor Anonymous Tags for Traceable Signatures
    Masayuki Abe, Sherman S.M. Chow, Kristiyan Haralambiev, Miyako Ohkubo

Hierarchical Identity-Based Chameleon Hash and Its Applications
    Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao

Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting
    Daiki Chiba, Takahiro Matsuda, Jacob C.N. Schuldt, Kanta Matsuura

Quantitatively Analyzing Stealthy Communication Channels
    Patrick Butler, Kui Xu, Danfeng (Daphne) Yao

Fully Non-interactive Onion Routing with Forward-Secrecy
    Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi

Generic Fully Simulatable Adaptive Oblivious Transfer
    Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong

Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
    Ashish Choudhury, Kaoru Kurosawa, Arpita Patra

Relaxed Security Notions for Signatures of Knowledge
    Marc Fischlin, Cristina Onete

LBlock: A Lightweight Block Cipher
    Wenling Wu, Lei Zhang

On Hiding a Plaintext Length by Preencryption
    Cihangir Tezcan, Serge Vaudenay

Fighting Pirates 2.0
    Paolo D’Arco, Angel L. Perez del Pozo

Security Notions for Broadcast Encryption
*
    Duong Hieu Phan, David Pointcheval, Mario Strefler

Towards User-Friendly Credential Transfer on Open Credential Platforms
    Kari Kostiainen, N. Asokan, Alexandra Afanasyeva

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks
    Jacob C.N. Schuldt, Goichiro Hanaoka

Composable Security Analysis of OS Services
    Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema

Practical Attacks on the Maelstrom-0 Compression Function
    Stefan Kolbl, Florian Mendel

Linear Analysis of Reduced-Round CubeHash
    Tomer Ashur, Orr Dunkelman

On the Indifferentiability of Fugue and Luffa
    Rishiraj Bhattacharyya, Avradip Mandal

Analysis of Message Injection in Stream Cipher-Based Hash Functions
    Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto

Secure Authenticated Comparisons
    Keith B. Frikken, Hao Yuan, Mikhail J. Atallah

Public-Key Encryption with Delegated Search
    Luan Ibraimi, Svetla Nikova, Pieter Hartel, Willem Jonker


Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
    Feng Hao, Dylan Clarke

Breaking an Animated CAPTCHA Scheme
    Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo

Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
    Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung

RIKE: Using Revocable Identities to Support Key Escrow in PKIs
    Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao

TreVisor: OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks
    Tilo Muller, Benjamin Taubmann, Felix C. Freiling

Authenticated Encryption: How Reordering Can Impact Performance
    Basel Alomair

Length-Doubling Ciphers and Tweakable Ciphers
    Haibin Zhang

Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
    Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu

Security Enhancements by OR-Proof in Identity-Based Identification
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa

Identity-Based Extractable Hash Proofs and Their Applications
    Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao

On Structural Signatures for Tree Data Structures
    Kai Samelin, Henrich C. Pohls, Arne Bilzhause, Joachim Posegga, Hermann de Meer

Inner-Product Lossy Trapdoor Functions and Applications
    Xiang Xie, Rui Xue, Rui Zhang

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
    Afonso Arriaga, Manuel Barbosa, Pooya Farshim

Secure Accumulators from Euclidean Rings without Trusted Setup
    Helger Lipmaa

Linear Fault Analysis of Block Ciphers
    Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li

Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
    Yuki Asano, Shingo Yanagihara, Tetsu Iwata

Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
    Yu Sasaki, Lei Wang

Zero-Value Point Attacks on Kummer-Based Cryptosystem
    Fangguo Zhang, Qiping Lin, Shengli Liu

PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
    Gilles Piret, Thomas Roche, Claude Carlet

Wide Collisions in Practice
*
    Xin Ye, Thomas Eisenbarth

A General Construction for 1-Round δ-RMT and (0, δ)-SMT
    Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang

A Prefiltering Approach to Regular Expression Matching for Network Security Systems
    Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang

iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
    Jason Gionta, Peng Ning, Xiaolan Zhang

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
    Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos

Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
    Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang

The Shy Mayor: Private Badges in GeoSocial Networks
    Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan

Detecting Social Spam Campaigns on Twitter
    Zi Chu, Indra Widjaja, Haining Wang

A New Framework for Privacy of RFID Path Authentication
    Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao

GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol
    Panagiotis Rizomiliotis, Stefanos Gritzalis

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
    Boyang Wang, Baochun Li, Hui Li

SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
    Sherman S.M. Chow, Yi-Jun He, Lucas C.K. Hui, Siu Ming Yiu

A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
    Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh P. Lin

Private Computation of Spatial and Temporal Power Consumption with Smart Meters
    Zekeriya Erkin, Gene Tsudik


Transparent, Distributed, and Replicated Dynamic Provable Data Possession
    Mohammad Etemad, Alptekin Küpçü

Client-Controlled Cryptography-as-a-Service in the Cloud
    Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
    Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou

Computing on Authenticated Data for Adjustable Predicates
    Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein

Towards Efficient Private Distributed Computation on Unbounded Input Streams
    Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky

From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting
    Sven Laur, Riivo Talviste, Jan Willemson

Private Database Queries Using Somewhat Homomorphic Encryption
    Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu

BLAKE2: Simpler, Smaller, Fast as MD5
    Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein

Cryptophia’s Short Combiner for Collision-Resistant Hash Functions
*
    Arno Mittelbach
Generic Attacks for the Xor of k Random Permutations
    Jacques Patarin

Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
    Yu Sasaki

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
    Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng

Sequential Aggregate Signatures Made Shorter
    Kwangsu Lee, Dong Hoon Lee, Moti Yung

How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
    Rikke Bendlin, Sara Krehbiel, Chris Peikert

Toward Practical Group Encryption
    Laila El Aimani, Marc Joye

Experimental Analysis of Attacks on Next Generation Air Traffic Communication
    Matthias Schäfer, Vincent Lenders, Ivan Martinovic

Launching Generic Attacks on iOS with Approved Third-Party Applications
    Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao, Yingjiu Li, Jianying Zhou


Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography *
    Erich Wenger

Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors
    Michael Henson, Stephen Taylor

NEON Implementation of an Attribute-Based Encryption Scheme
    Ana Helena Sánchez, Francisco Rodríguez-Henríquez

Fast and Maliciously Secure Two-Party Computation Using the GPU
    Tore Kasper Frederiksen, Jesper Buus Nielsen

Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
    Aurore Guillevic

FROST: Forensic Recovery of Scrambled Telephones
    Tilo Müller, Michael Spreitzenbarth

Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose Hardware
    Alexander Wild, Tim Güneysu, Amir Moradi

Keystroke Timing Analysis of on-the-fly Web Apps
    Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang

Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance
    Marc Fischlin, Cristina Onete

CrowdShare: Secure Mobile Resource Sharing
    N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle

Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
    Filip Zagórski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
    Koutarou Suzuki, Kazuki Yoneyama

Public Key Exchange Using Semidirect Product of (Semi) Groups
    Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain

Leakage Resilient IBE and IPE under the DLIN Assumption
    Kaoru Kurosawa, Le Trieu Phong

Batch Proofs of Partial Knowledge
    Ryan Henry, Ian Goldberg

Efficient Signatures of Knowledge and DAA in the Standard Model
    David Bernhard, Georg Fuchsbauer, Essam Ghadafi

Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes
    Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud

Primeless Factoring-Based Cryptography
    Sonia Bogos, Ioana Boureanu, Serge Vaudenay


New Modular Compilers for Authenticated Key Exchange
    Yong Li, Sven Schage, Zheng Yang, Christoph Bader, Jorg Schwenk


Password-Based Authenticated Key Exchange without Centralized Trusted Setup
    Kazuki Yoneyama

A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
    M. Kreuzer, A.D. Myasnikov, A. Ushakov

Improved Constructions of PRFs Secure against Related-Key Attacks
    Kevin Lewi, Hart Montgomery, Ananth Raghunathan

Verifiable Multi-server Private Information Retrieval
    Liang Feng Zhang, Reihaneh Safavi-Naini

Certified Bitcoins
    Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
    Jia Xu, Jianying Zhou

Private Message Transmission Using Disjoint Paths
    Hadi Ahmadi, Reihaneh Safavi-Naini

Partial Key Exposure Attacks on Takagi’s Variant of RSA
    Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie

New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
    Yao Lu, Rui Zhang, Dongdai Lin

Bit-Flip Faults on Elliptic Curve Base Fields, Revisited
    Taechan Kim, Mehdi Tibouchi


All-but-One Dual Projective Hashing and Its Applications
    Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao

Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange
    Franziskus Kiefer, Mark Manulis

Sakura: A Flexible Coding for Tree Hashing
    Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche

Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions
    Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta

Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications
    Yu Sasaki

On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
    Celine Blondeau, Andrey Bogdanov, Meiqin Wang

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function
    Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li

Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
    Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu

Detecting Hidden Leakages *
    Amir Moradi, Sylvain Guilley, Annelie Heuser

Improving Intrusion Detection Systems for Wireless Sensor Networks
    Andriy Stetsko, Tobias Smolka, Vashek Matyas, Martin Stehlık

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
    Zhe Liu, Erich Wenger, Johann Großschadl

BackRef: Accountability in Anonymous Communication Networks
    Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel

WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP
    Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nurnberger, Dominique Schroder, Mark Simkin

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List
    Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai

Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials
    Sabyasachi Karati, Abhijit Das

On Updatable Redactable Signatures
    Henrich C. Pohls, Kai Samelin

Practical Signatures from the Partial Fourier Recovery Problem
    Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte

Activity Spoofing and Its Defense in Android Smartphones
    Brett Cooley, Haining Wang, Angelos Stavrou

Polymorphism as a Defense for Automated Attack of Websites
    Xinran Wang, Tadayoshi Kohno, Bob Blakley

Fragmentation Considered Leaking: Port Inference for DNS Poisoning
    Haya Shulman, Michael Waidner

Delegating a Pairing Can Be Both Secure and Efficient
    Sebastien Canard, Julien Devigne, Olivier Sanders

Automatic Protocol Selection in Secure Two-Party Computations
    Florian Kerschbaum, Thomas Schneider, Axel Schropfer


Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
    Berry Schoenmakers, Meilof Veeningen


Communication-Optimal Proactive Secret Sharing for Dynamic Groups
    Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky

Round-Optimal Password-based Group Key Exchange Protocols in the Standard Model
    Jing Xu, Xuexian Hu, Zhenfeng Zhang

Generic Construction of UC-Secure Oblivious Transfer
    Olivier Blazy, Celine Chevalier

Non-malleability under Selective Opening Attacks: Implication and Separation
    Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen

A Signature Scheme with a Fuzzy Private Key
    Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki

Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
    Zhen Liu, Duncan S. Wong

Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
*
    Esha Ghosh, Olga Ohrimenko, Roberto Tamassia

Private Database Access with HE-over-ORAM Architecture
    Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
    Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama

LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data
    Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang

Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking
*
    Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik

Post-Quantum Forward Secure Onion Routing (Future Anonymity in Today's Budget)
    Satrajit Ghosh, Aniket Kate

Scalable Divisible E-Cash
    Sebatien Canard, David Pointcheval, Oliviers Sanders, Jacques Traore

Recovering Lost Device-Bound Credentials
    Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
    Aleksandar Kircanski

Time-Memory Trade-off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
    Jiqiang Lu, Zhen Li, Matt Henricksen

Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
    Yuval Yarom, Gefei Li, Damith C. Ranasinghe

Cryptographic Enforcement of Information Flow Policies without Public Information
    Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering

A Fully Decentralized Data Usage Control Enforcement Infrastructure
    Florian Kelbert, Alexander Pretschner

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
    Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel

Exploiting Eye Tracking for Smartphone Authentication
    Dachuan Liu, Bo Dong, Xing Gao, Haining Wang

Optimal Proximity Proofs Revisited
    Handan Kilinc, Serge Vaudenay

Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications
    Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao

Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
    Atsushi Takayasu, Noboru Kunihiro

Differential Power Analysis of a McEliece Cryptosystem
    Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

Arithmetic Addition over Boolean Masking, Towards First- and Second-Order Resistance in Hardware
    Tobias Schneider, Amir Moradi, Tim Gneysu

Foundations of Reconfigurable PUFs
    Jonas Schneider, Dominique Schrder

mrPUF: A Novel Memristive Device Based Physical Unclonable Function
    Yansong Gao, Damith C. Ranasinghe, Omid Kavehei, Said F. Al-Sarawi, Derek Abbott

On the XOR of Multiple Random Permutations
    Bart Mennink, Bart Preneel

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
    Michel Abdalla, Sonia Belad, David Pointcheval, Sylvain Ruhault, Damien Vergnaud

Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
    Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti

Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
    Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing

Automatic Protocol Selection in Secure Two-Party Computations
    Florian Kerschbaum, Thomas Schneider, Axel Schropfer


On the Security of the Algebraic Eraser Tag Authentication Protocol
    Simon R. Blackburn, M.J.B. Robshaw

A Cryptographic Analysis of UMTS/LTE AKA
    Stephanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
    Ian Goldberg, Graeme Jenkinson, Frank Stajano

Two More Efficient Variants of the J-PAKE Protocol
    Jean Lancrenon, Marjan Škrobot, Qiang Tang

Hash-Based TPM Signatures for the Quantum World
    Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire

Fuzzy Signatures: Relaxing Requirements and a New Construction
    Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka

Foundations of Fully Dynamic Group Signatures
    Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth

A Lattice-Based Group Signature Scheme with Message-Dependent Opening
    Benoît Libert, Fabrice Mouhartem, Khoa Nguyen

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
    Rosario Gennaro, Steven Goldfeder, Arvind Narayanan

Legally Fair Contract Signing Without Keystones
    Houda Ferradi, Rémi Géraud, Diana Maimuț, David Naccache, David Pointcheval

Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms
    Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou

Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
    Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad

More Efficient Constructions for Inner-Product Encryption
    Somindu C. Ramanna

Attribute Based Encryption with Direct Efficiency Tradeoff
    Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada

Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions
    Xavier Boyen, Qinyi Li

Offline Witness Encryption
    Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak

Deterministic Public-Key Encryption Under Continual Leakage
    Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters

Better Preprocessing for Secure Multiparty Computation
    Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias

Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Berry Schoenmakers, Meilof Veeningen, Niels de Vreede

Verifiable Multi-party Computation with Perfectly Private Audit Trail
    Édouard Cuvelier, Olivier Pereira

Practical Fault-Tolerant Data Aggregation
    Krzysztof Grining, Marek Klonowski, Piotr Syga

Accelerating Homomorphic Computations on Rational Numbers
    Angela Jäschke, Frederik Armknecht

New Techniques for Non-interactive Shuffle and Range Arguments
    Alonso González, Carla Ráfols

Constrained PRFs for Unbounded Inputs with Short Keys
    Hamza Abusalah, Georg Fuchsbauer

Wide Trail Design Strategy for Binary MixColumns: Enhancing Lower Bound of Number of Active S-boxes
    Yosuke Todo, Kazumaro Aoki

Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
    Yunwen Liu, Qingju Wang, Vincent Rijmen

Square Attack on 7-Round Kiasu-BC
    Christoph Dobraunig, Maria Eichlseder, Florian Mendel

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
    Kota Kondo, Yu Sasaki, Tetsu Iwata

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
    Alex Biryukov, Daniel Dinu, Johann Großschädl

Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing
    Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque

Parallel Implementation of BDD Enumeration for LWE *
    Elena Kirshanova, Alexander May, Friedrich Wiemer

Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
    Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger

CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery
    Mauro Conti, Claudio Guarisco, Riccardo Spolaor

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones
    Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou

Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
    Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar


* Best student paper award.



Maintained by Jianying Zhou
Last updated in July 2016