Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Angela Jäschke, Frederik Armknecht |
Accelerating Homomorphic Computations on Rational Numbers. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad |
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yunwen Liu, Qingju Wang 0001, Vincent Rijmen |
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Weizhi Meng 0001, Wenjuan Li 0001, Duncan S. Wong, Jianying Zhou 0001 |
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar |
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger |
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Grining, Marek Klonowski, Piotr Syga |
Practical Fault-Tolerant Data Aggregation. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider (eds.) |
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ian Goldberg, Graeme Jenkinson, Frank Stajano |
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hamza Abusalah, Georg Fuchsbauer |
Constrained PRFs for Unbounded Inputs with Short Keys. |
ACNS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes 0001, Ninja Marnau, Peter Druschel |
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Berry Schoenmakers, Meilof Veeningen |
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xu 0002, Xuexian Hu, Zhenfeng Zhang |
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kenta Takahashi, Takahiro Matsuda 0002, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki |
A Signature Scheme with a Fuzzy Private Key. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Schneider 0002, Amir Moradi 0001, Tim Güneysu |
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik |
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky |
Communication-Optimal Proactive Secret Sharing for Dynamic Groups. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kelbert, Alexander Pretschner |
A Fully Decentralized Data Usage Control Enforcement Infrastructure. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré |
Scalable Divisible E-cash. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven |
Recovering Lost Device-Bound Credentials. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang 0135 |
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Esha Ghosh, Olga Ohrimenko, Roberto Tamassia |
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott |
mrPUF: A Novel Memristive Device Based Physical Unclonable Function. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lu, Zhen Li, Matt Henricksen |
Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Satrajit Ghosh, Aniket Kate |
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cong Chen, Thomas Eisenbarth 0001, Ingo von Maurich, Rainer Steinwandt |
Differential Power Analysis of a McEliece Cryptosystem. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones 0001, Bertram Poettering |
Cryptographic Enforcement of Information Flow Policies Without Public Information. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bart Mennink, Bart Preneel |
On the XOR of Multiple Random Permutations. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti |
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhengan Huang, Shengli Liu 0001, Xianping Mao, Kefei Chen |
Non-malleability Under Selective Opening Attacks: Implication and Separation. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Aniket Kate, Sebastian Meiser 0001, Tim Ruffing |
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) |
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandar Kircanski |
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Handan Kilinç, Serge Vaudenay |
Optimal Proximity Proofs Revisited. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Blazy, Céline Chevalier |
Generic Construction of UC-Secure Oblivious Transfer. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud |
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Takayasu, Noboru Kunihiro |
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Yarom, Gefei Li 0001, Damith Chinthana Ranasinghe |
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova 0001 |
Private Database Access with HE-over-ORAM Architecture. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao |
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Schneider 0001, Dominique Schröder |
Foundations of Reconfigurable PUFs. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Liu 0008, Duncan S. Wong |
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dachuan Liu, Bo Dong, Xing Gao 0001, Haining Wang |
Exploiting Eye Tracking for Smartphone Authentication. |
ACNS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Lewi, Hart William Montgomery, Ananth Raghunathan |
Improved Constructions of PRFs Secure Against Related-Key Attacks. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haya Schulmann, Michael Waidner |
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Feng Zhang, Reihaneh Safavi-Naini |
Verifiable Multi-server Private Information Retrieval. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Taechan Kim 0001, Mehdi Tibouchi |
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xinran Wang, Tadayoshi Kohno, Bob Blakley 0001 |
Polymorphism as a Defense for Automated Attack of Websites. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
Password-Based Authenticated Key Exchange without Centralized Trusted Setup. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Céline Blondeau, Andrey Bogdanov, Meiqin Wang |
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov |
A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amir Moradi 0001, Sylvain Guilley, Annelie Heuser |
Detecting Hidden Leakages. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001, Kazuki Yoneyama, Kazuo Ohta |
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin 0001 |
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jia Xu 0006, Jianying Zhou 0001 |
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sabyasachi Karati, Abhijit Das 0004 |
Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001 |
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Julien Devigne, Olivier Sanders |
Delegating a Pairing Can Be Both Secure and Efficient. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Henrich Christopher Pöhls, Kai Samelin |
On Updatable Redactable Signatures. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Liu 0001, Erich Wenger, Johann Großschädl |
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík |
Improving Intrusion Detection Systems for Wireless Sensor Networks. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel |
BackRef: Accountability in Anonymous Communication Networks. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhangjie Huang, Lei Hu, Jun Xu 0022, Liqiang Peng, Yonghong Xie |
Partial Key Exposure Attacks on Takagi's Variant of RSA. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zongyang Zhang, Yu Chen 0003, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao |
All-but-One Dual Projective Hashing and Its Applications. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yong Li 0021, Sven Schäge, Zheng Yang 0005, Christoph Bader, Jörg Schwenk |
New Modular Compilers for Authenticated Key Exchange. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.) |
Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu |
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hadi Ahmadi, Reihaneh Safavi-Naini |
Private Message Transmission Using Disjoint Paths. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
Sakura: A Flexible Coding for Tree Hashing. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte |
Practical Signatures from the Partial Fourier Recovery Problem. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brett Cooley, Haining Wang, Angelos Stavrou |
Activity Spoofing and Its Defense in Android Smartphones. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer |
Automatic Protocol Selection in Secure Two-Party Computations. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros |
Certified Bitcoins. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yao Lu 0002, Rui Zhang 0002, Dongdai Lin |
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Franziskus Kiefer, Mark Manulis |
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sonia Bogos, Ioana Boureanu, Serge Vaudenay |
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tore Kasper Frederiksen, Jesper Buus Nielsen |
Fast and Maliciously Secure Two-Party Computation Using the GPU. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Stanislaus Stelle |
CrowdShare: Secure Mobile Resource Sharing. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Etemad, Alptekin Küpçü |
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu 0001 |
Private Database Queries Using Somewhat Homomorphic Encryption. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aurore Guillevic |
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein |
Computing on Authenticated Data for Adjustable Predicates. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
Generic Attacks for the Xor of k Random Permutations. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ana Helena Sánchez, Francisco Rodríguez-Henríquez |
NEON Implementation of an Attribute-Based Encryption Scheme. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky |
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract). |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora |
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Laila El Aimani, Marc Joye |
Toward Practical Group Encryption. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Schäfer 0002, Vincent Lenders, Ivan Martinovic |
Experimental Analysis of Attacks on Next Generation Air Traffic Communication. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rikke Bendlin, Sara Krehbiel, Chris Peikert |
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi |
Client-Controlled Cryptography-as-a-Service in the Cloud. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Cristina Onete |
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Kazuki Yoneyama |
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Le Trieu Phong |
Leakage Resilient IBE and IPE under the DLIN Assumption. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arno Mittelbach |
Cryptophia's Short Combiner for Collision-Resistant Hash Functions. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Bernhard, Georg Fuchsbauer, Essam Ghadafi |
Efficient Signatures of Knowledge and DAA in the Standard Model. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (eds.) |
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiangxue Li, Haifeng Qian, Yu Yu 0001, Yuan Zhou 0008, Jian Weng 0001 |
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|