


default search action
14th ACNS 2016: Guildford, UK
- Mark Manulis
, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8
Authentication and Key Establishment
- Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. 3-17 - Stéphanie Alt, Pierre-Alain Fouque
, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. 18-35 - Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. 36-57 - Jean Lancrenon, Marjan Skrobot
, Qiang Tang:
Two More Efficient Variants of the J-PAKE Protocol. 58-76 - Megumi Ando, Joshua D. Guttman
, Alberto R. Papaleo, John Scire:
Hash-Based TPM Signatures for the Quantum World. 77-94
Signatures with Advanced Properties
- Takahiro Matsuda
, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
:
Fuzzy Signatures: Relaxing Requirements and a New Construction. 97-116 - Jonathan Bootle
, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi
, Jens Groth
:
Foundations of Fully Dynamic Group Signatures. 117-136 - Benoît Libert, Fabrice Mouhartem, Khoa Nguyen
:
A Lattice-Based Group Signature Scheme with Message-Dependent Opening. 137-155 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. 156-174 - Houda Ferradi, Rémi Géraud
, Diana Maimut
, David Naccache, David Pointcheval
:
Legally Fair Contract Signing Without Keystones. 175-190
DoS Attacks and Network Anomaly Detection
- Ryan Johnson, Mohamed Elsabagh
, Angelos Stavrou
:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. 193-211 - Xiejun Ni, Daojing He
, Sammy Chan, Farooq Ahmad:
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. 212-227
Deterministic and Functional Encryption
- Somindu C. Ramanna:
More Efficient Constructions for Inner-Product Encryption. 231-248 - Nuttapong Attrapadung
, Goichiro Hanaoka
, Tsutomu Matsumoto, Tadanori Teruya
, Shota Yamada
:
Attribute Based Encryption with Direct Efficiency Tradeoff. 249-266 - Xavier Boyen, Qinyi Li:
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. 267-284 - Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. 285-303 - Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters:
Deterministic Public-Key Encryption Under Continual Leakage. 304-323
Computing on Encrypted Data
- Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Better Preprocessing for Secure Multiparty Computation. 327-345 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation. 346-366 - Edouard Cuvelier, Olivier Pereira:
Verifiable Multi-party Computation with Perfectly Private Audit Trail. 367-385 - Krzysztof Grining, Marek Klonowski, Piotr Syga
:
Practical Fault-Tolerant Data Aggregation. 386-404 - Angela Jäschke, Frederik Armknecht
:
Accelerating Homomorphic Computations on Rational Numbers. 405-423
Non-Interactive Proofs and PRFs
- Alonso González, Carla Ràfols
:
New Techniques for Non-interactive Shuffle and Range Arguments. 427-444 - Hamza Abusalah
, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. 445-463
Symmetric Ciphers
- Yosuke Todo
, Kazumaro Aoki:
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. 467-484 - Yunwen Liu, Qingju Wang
, Vincent Rijmen
:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. 485-499 - Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
:
Square Attack on 7-Round Kiasu-BC. 500-517 - Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. 518-536 - Alex Biryukov
, Daniel Dinu, Johann Großschädl:
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. 537-557
Cryptography in Software
- Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
:
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing. 561-579 - Elena Kirshanova
, Alexander May
, Friedrich Wiemer
:
Parallel Implementation of BDD Enumeration for LWE. 580-591 - Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
:
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. 592-608
Security for Human Use
- Mauro Conti
, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. 611-628 - Weizhi Meng
, Wenjuan Li
, Duncan S. Wong, Jianying Zhou
:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. 629-647 - Jagmohan Chauhan, Hassan Jameel Asghar
, Anirban Mahanti, Mohamed Ali Kâafar
:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. 648-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.