


default search action
8th ACNS 2010: Beijing, China
- Jianying Zhou, Moti Yung:

Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings. Lecture Notes in Computer Science 6123, 2010, ISBN 978-3-642-13707-5
Public Key Encryption
- Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi

, Damien Vergnaud
:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. 1-18 - Huang Lin, Zhenfu Cao

, Xiaohui Liang
, Muxin Zhou, Haojin Zhu
, Dongsheng Xing:
How to Construct Interval Encryption from Binary Tree Encryption. 19-34 - Xavier Boyen, Brent Waters:

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. 35-52
Digital Signature
- Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee:

Trapdoor Sanitizable Signatures Made Easy. 53-68 - Markus Rückert, Michael Schneider, Dominique Schröder

:
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. 69-86 - Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis

, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. 87-104
Block Ciphers and Hash Functions
- Yuechuan Wei, Ping Li, Bing Sun, Chao Li:

Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. 105-122 - Baudoin Collard, François-Xavier Standaert

:
Multi-trail Statistical Saturation Attacks. 123-138 - Alex Biryukov

, Deike Priemuth-Schmid, Bin Zhang:
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . 139-153 - Nicolas Méloni, Christophe Nègre, M. Anwar Hasan:

High Performance GHASH Function for Long Messages. 154-167
Side-Channel Attacks
- Jiqiang Lu, Jing Pan, Jerry den Hartog:

Principles on the Security of AES against First and Second-Order Differential Power Analysis. 168-185 - Nicolas Veyrat-Charvillon, François-Xavier Standaert

:
Adaptive Chosen-Message Side-Channel Attacks. 186-199 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:

Secure Multiplicative Masking of Power Functions. 200-217
Zero Knowledge and Multi-party Protocols
- Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud

:
Batch Groth-Sahai. 218-235 - Matthew K. Franklin, Payman Mohassel:

Efficient and Secure Evaluation of Multivariate Polynomials and Applications. 236-254 - Thomas P. Jakobsen, Marc X. Makkes

, Janus Dam Nielsen:
Efficient Implementation of the Orlandi Protocol. 255-272 - Aggelos Kiayias, Serdar Pehlivanoglu:

Improving the Round Complexity of Traitor Tracing Schemes. 273-290
Key Management
- Julien Bringer, Hervé Chabanne, Thomas Icart:

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. 291-308 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. 309-328 - Andrew Chi-Chih Yao, Yunlei Zhao:

Deniable Internet Key Exchange. 329-348
Authentication and Identification
- Hassan Jameel Asghar

, Josef Pieprzyk
, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. 349-366 - Chengfang Fang, Qiming Li, Ee-Chien Chang

:
Secure Sketch for Multiple Secrets. 367-383 - Atefeh Mashatan

, Serge Vaudenay:
A Message Recognition Protocol Based on Standard Assumptions. 384-401
Privacy and Anonymity
- Mark Manulis

, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. 402-419 - Mark Manulis

, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. 420-437 - Helger Lipmaa

, Bingsheng Zhang:
Two New Efficient PIR-Writing Protocols. 438-455 - Bogdan Carbunar, Radu Sion:

Regulatory Compliant Oblivious RAM. 456-474
RFID Security and Privacy
- Junzuo Lai, Robert H. Deng

, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. 475-492 - Frederik Armknecht

, Ahmad-Reza Sadeghi, Ivan Visconti
, Christian Wachsmann:
On RFID Privacy with Mutual Authentication and Tag Corruption. 493-510
Internet Security
- Erhan J. Kartaltepe, Jose Andre Morales

, Shouhuai Xu, Ravi S. Sandhu:
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. 511-528 - Wei Xu, Sencun Zhu, Heng Xu:

COP: A Step toward Children Online Privacy. 529-544 - Xuhua Ding

:
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. 545-562

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














