default search action
12. CANS 2013: Paraty, Brazil
- Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab:
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings. Lecture Notes in Computer Science 8257, Springer 2013, ISBN 978-3-319-02936-8
Cryptanalysis I
- Valérie Nachef, Emmanuel Volte, Jacques Patarin:
Differential Attacks on Generalized Feistel Schemes. 1-19 - Bo Zhu, Yin Tan, Guang Gong:
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. 20-38 - Si Gao, Hua Chen, Limin Fan:
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? 39-56
Zero-Knowledge Protocols
- Xiang Xie, Rui Xue, Minqian Wang:
Zero Knowledge Proofs from Ring-LWE. 57-73 - Emmanuel Volte, Jacques Patarin, Valérie Nachef:
Zero Knowledge with Rubik's Cubes and Non-abelian Groups. 74-91 - Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang:
Efficient Modular NIZK Arguments from Shift and Product. 92-121
Distributed Protocols
- Yong Li, Zheng Yang:
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. 122-138 - Sourya Joyee De, Asim K. Pal:
Achieving Correctness in Fair Rational Secret Sharing. 139-161
Network Security and Applications
- Nizar Kheir, Chirine Wolley:
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. 162-178 - Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias:
Resource Access Control in the Facebook Model. 179-198 - Babins Shrestha, Nitesh Saxena, Justin Harrison:
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. 199-217
Advanced Cryptographic Primitives
- Mihir Bellare, Adam O'Neill:
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. 218-234 - Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu:
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. 235-250 - Veronika Kuchta, Mark Manulis:
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. 251-270
Cryptanalysis II
- Tomer Ashur, Orr Dunkelman:
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. 271-290 - Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld:
Truncated Differential Analysis of Reduced-Round LBlock. 291-308
Verifiable Computation
- Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Update Documents Verifiably in Searchable Symmetric Encryption. 309-328 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. 329-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.