Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani |
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Obana, Maki Yoshida |
An Efficient Construction of Non-Interactive Secure Multiparty Computation. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Thalia M. Laing, Keith M. Martin |
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan |
An Automatic Cryptanalysis of Transposition Ciphers Using Compression. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Range Query Integrity in Cloud Data Streams with Efficient Insertion. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou, Naser Al-Ibrahim |
Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khoa Nguyen 0002, Huaxiong Wang, Juanyang Zhang |
Server-Aided Revocable Identity-Based Encryption from Lattices. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang |
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joash W. J. Tan, Roland H. C. Yap |
Detecting Malware Through Anti-analysis Signals - A Preliminary Study. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Si Gao, Hua Chen 0011, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma |
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk |
Breaking PPTP VPNs via RADIUS Encryption. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Kimmo Halunen, Bart Mennink |
Improving the Sphinx Mix Network. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Luca Ferretti, Michele Colajanni, Mirco Marchetti |
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman |
User Authentication from Mouse Movement Data Using SVM Classifier. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Aceto, Antonio Montieri, Antonio Pescapè |
Internet Censorship in Italy: A First Look at 3G/4G Networks. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Claude Royer, Anderson Santana de Oliveira |
AAL and Static Conflict Detection in Policy. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas |
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Eunkyung Kim 0002, Mehdi Tibouchi |
FHE Over the Integers and Modular Arithmetic Circuits. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool |
Language-Based Hypervisors. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rachid El Bansarkhani, Jan Sturm |
An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia |
Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gérald Gavin |
An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo |
Implementation State of HSTS and HPKP in Both Browsers and Servers. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li 0003, Yuqing Zhang 0001 |
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathilde Igier, Serge Vaudenay |
Distance Bounding Based on PUF. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001, Keisuke Tanaka |
Group Signature with Deniability: How to Disavow a Signature. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta |
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zhang, Wen-Ling Wu |
Security of Online AE Schemes in RUP Setting. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa |
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan |
LEAP: A Next-Generation Client VPN and Encrypted Email Provider. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takaaki Mizuki |
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Valérie Nachef, Nicolas Marrière, Emmanuel Volte |
Improved Attacks on Extended Generalized Feistel Networks. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel |
A Privacy-Preserving Model for Biometric Fusion. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Faustin Mbol, Jean-Marc Robert 0001, Alireza Sadighian |
An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel |
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama |
Evaluation on Malware Classification by Session Sequence of Common Protocols. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kirill Belyaev, Indrakshi Ray |
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Iovino, Qiang Tang 0001, Karol Zebrowski |
On the Power of Public-key Function-Private Functional Encryption. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tianxiang Dai, Haya Schulmann, Michael Waidner |
DNSSEC Misconfigurations in Popular Domains. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine |
Verifiable Message-Locked Encryption. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vicenç Torra, Guillermo Navarro-Arribas |
Integral Privacy. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yu Pu, Jens Grossklags |
Sharing Is Caring, or Callous? |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kalikinkar Mandal, Basel Alomair, Radha Poovendran |
Secure Error-Tolerant Graph Matching Protocols. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto |
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kai Simon |
Vulnerability Analysis Using Google and Shodan. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Giuseppe Persiano (eds.) |
Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Derler, Stephan Krenn, Daniel Slamanig |
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. |
CANS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Kiliç, Claudia Eckert 0001 |
iDeFEND: Intrusion Detection Framework for Encrypted Network Data. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci |
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò |
On the Weaknesses of PBKDF2. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simone Bossi, Andrea Visconti |
What Users Should Know About Full Disk Encryption Based on LUKS. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle |
Bandwidth-Optimized Secure Two-Party Computation of Minima. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort |
A Security Framework for Internet of Things. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bei Liang, Hongda Li 0001, Jinyong Chang |
Verifiable Random Functions from (Leveled) Multilinear Maps. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa, Kateryna Pavlyk |
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Changyu Dong, Franziskus Kiefer |
Secure Set-Based Policy Checking and Its Application to Password Registration. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada |
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael K. Reiter, David Naccache (eds.) |
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena |
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka |
SEPM: Efficient Partial Keyword Search on Encrypted Data. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler |
Outsourcing Secure Two-Party Computation as a Black Box. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva |
PUDA - Privacy and Unforgeability for Data Aggregation. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer |
Privacy-Aware Authentication in the Internet of Things. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi |
A Formal Environment for MANET Organization and Security. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maroua Gharam, Meriem Salhi, Noureddine Boudriga |
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. |
CANS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo, Kazumaro Aoki |
FFT Key Recovery for Integral Attack. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kelbert, Alexander Pretschner |
Decentralized Distributed Data Usage Control. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Böhl, Simon Greiner, Patrik Scheidecker |
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Felix Günther 0001, Mark Manulis, Andreas Peter |
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré |
Direct Anonymous Attestations with Dependent Basename Opening. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Fotiadis, Elisavet Konstantinou |
More Sparse Families of Pairing-Friendly Elliptic Curves. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa |
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali El Kaafarani, Liqun Chen 0002, Essam Ghadafi, James H. Davenport |
Attribute-Based Signatures with User-Controlled Linkability. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Kortelainen, Juha Kortelainen |
New Second Preimage Attack Variants against the MD-Structure. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031 |
Message Extension Attack against Authenticated Encryptions: Application to PANDA. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Sushmita Ruj, Asim K. Pal |
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Akanksha Sharma, Subrat Kumar Dash |
Mining API Calls and Permissions for Android Malware Detection. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva |
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers |
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento |
Universally Composable Oblivious Transfer Based on a Variant of LPN. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis (eds.) |
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa |
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Guo, Zhenfeng Zhang, Jiang Zhang 0001 |
Proxy Re-encryption with Unforgeable Re-encryption Keys. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Kazuki Yoneyama |
Converting PKI-Based Authenticated Key Exchange to Identity-Based. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001 |
Short Comparable Encryption. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Bao Li 0001, Xianhui Lu, Kunpeng Wang, Yamin Liu |
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bart Mennink, Bart Preneel |
Breaking and Fixing Cryptophia's Short Combiner. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bader |
Efficient Signatures with Tight Real World Security in the Random-Oracle Model. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clear, Ciaran McGoldrick |
Bootstrappable Identity-Based Fully Homomorphic Encryption. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Wachs, Martin Schanzenbach, Christian Grothoff |
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Negotiating DNSSEC Algorithms over Legacy Proxies. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Si Gao, Hua Chen 0011, Limin Fan |
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yong Li 0021, Zheng Yang 0005 |
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tomer Ashur, Orr Dunkelman |
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Xie, Rui Xue 0001, Minqian Wang |
Zero Knowledge Proofs from Ring-LWE. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Asim K. Pal |
Achieving Correctness in Fair Rational Secret Sharing. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias |
Resource Access Control in the Facebook Model. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|