Search dblp for Publications

export results for "toc:db/conf/acns/acns2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/0002ES16,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Why Software DoS Is Hard to Fix: Denying Access in Embedded Android
                  Platforms},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_11},
  doi          = {10.1007/978-3-319-39555-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/0002ES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0002TMH16,
  author       = {Takahiro Matsuda and
                  Kenta Takahashi and
                  Takao Murakami and
                  Goichiro Hanaoka},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Fuzzy Signatures: Relaxing Requirements and a New Construction},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_6},
  doi          = {10.1007/978-3-319-39555-5\_6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/0002TMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbusalahF16,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Constrained PRFs for Unbounded Inputs with Short Keys},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {445--463},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_24},
  doi          = {10.1007/978-3-319-39555-5\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AbusalahF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbusalahFP16,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Offline Witness Encryption},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {285--303},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_16},
  doi          = {10.1007/978-3-319-39555-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AbusalahFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AltFMOR16,
  author       = {St{\'{e}}phanie Alt and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat and
                  Cristina Onete and
                  Benjamin Richard},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {A Cryptographic Analysis of {UMTS/LTE} {AKA}},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_2},
  doi          = {10.1007/978-3-319-39555-5\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AltFMOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AndoGPS16,
  author       = {Megumi Ando and
                  Joshua D. Guttman and
                  Alberto R. Papaleo and
                  John Scire},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Hash-Based {TPM} Signatures for the Quantum World},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_5},
  doi          = {10.1007/978-3-319-39555-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AndoGPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AttrapadungHMT016,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Tsutomu Matsumoto and
                  Tadanori Teruya and
                  Shota Yamada},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Attribute Based Encryption with Direct Efficiency Tradeoff},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {249--266},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_14},
  doi          = {10.1007/978-3-319-39555-5\_14},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AttrapadungHMT016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {327--345},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_18},
  doi          = {10.1007/978-3-319-39555-5\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BiryukovDG16,
  author       = {Alex Biryukov and
                  Daniel Dinu and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Correlation Power Analysis of Lightweight Block Ciphers: From Theory
                  to Practice},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {537--557},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_29},
  doi          = {10.1007/978-3-319-39555-5\_29},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BiryukovDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_1},
  doi          = {10.1007/978-3-319-39555-5\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BootleCCGG16,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Pyrros Chaidos and
                  Essam Ghadafi and
                  Jens Groth},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Foundations of Fully Dynamic Group Signatures},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {117--136},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_7},
  doi          = {10.1007/978-3-319-39555-5\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BootleCCGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoyenL16,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Turing Machines with Shortcuts: Efficient Attribute-Based Encryption
                  for Bounded Functions},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_15},
  doi          = {10.1007/978-3-319-39555-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoyenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChauhanAMK16,
  author       = {Jagmohan Chauhan and
                  Hassan Jameel Asghar and
                  Anirban Mahanti and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Gesture-Based Continuous Authentication for Wearable Devices: The
                  Smart Glasses Use Case},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {648--665},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_35},
  doi          = {10.1007/978-3-319-39555-5\_35},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ChauhanAMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ContiGS16,
  author       = {Mauro Conti and
                  Claudio Guarisco and
                  Riccardo Spolaor},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {CAPTCHaStar! {A} Novel {CAPTCHA} Based on Interactive Shape Discovery},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {611--628},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_33},
  doi          = {10.1007/978-3-319-39555-5\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ContiGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CuvelierP16,
  author       = {Edouard Cuvelier and
                  Olivier Pereira},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Verifiable Multi-party Computation with Perfectly Private Audit Trail},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {367--385},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_20},
  doi          = {10.1007/978-3-319-39555-5\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CuvelierP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Square Attack on 7-Round Kiasu-BC},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {500--517},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_27},
  doi          = {10.1007/978-3-319-39555-5\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Legally Fair Contract Signing Without Keystones},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_10},
  doi          = {10.1007/978-3-319-39555-5\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GennaroGN16,
  author       = {Rosario Gennaro and
                  Steven Goldfeder and
                  Arvind Narayanan},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Threshold-Optimal {DSA/ECDSA} Signatures and an Application to Bitcoin
                  Wallet Security},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {156--174},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_9},
  doi          = {10.1007/978-3-319-39555-5\_9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GennaroGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GoldbergJS16,
  author       = {Ian Goldberg and
                  Graeme Jenkinson and
                  Frank Stajano},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Low-Cost Mitigation Against Cold Boot Attacks for an Authentication
                  Token},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {36--57},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_3},
  doi          = {10.1007/978-3-319-39555-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GoldbergJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GonzalezR16,
  author       = {Alonso Gonz{\'{a}}lez and
                  Carla R{\`{a}}fols},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {New Techniques for Non-interactive Shuffle and Range Arguments},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_23},
  doi          = {10.1007/978-3-319-39555-5\_23},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GonzalezR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GougeonBLAR16,
  author       = {Thomas Gougeon and
                  Morgan Barbier and
                  Patrick Lacharme and
                  Gildas Avoine and
                  Christophe Rosenberger},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Memory Carving in Embedded Devices: Separate the Wheat from the Chaff},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {592--608},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_32},
  doi          = {10.1007/978-3-319-39555-5\_32},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GougeonBLAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GriningKS16,
  author       = {Krzysztof Grining and
                  Marek Klonowski and
                  Piotr Syga},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Practical Fault-Tolerant Data Aggregation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {386--404},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_21},
  doi          = {10.1007/978-3-319-39555-5\_21},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GriningKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JaschkeA16,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Accelerating Homomorphic Computations on Rational Numbers},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_22},
  doi          = {10.1007/978-3-319-39555-5\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JaschkeA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Kirshanova0W16,
  author       = {Elena Kirshanova and
                  Alexander May and
                  Friedrich Wiemer},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Parallel Implementation of {BDD} Enumeration for {LWE}},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {580--591},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_31},
  doi          = {10.1007/978-3-319-39555-5\_31},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Kirshanova0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KondoSI16,
  author       = {Kota Kondo and
                  Yu Sasaki and
                  Tetsu Iwata},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {On the Design Rationale of Simon Block Cipher: Integral Attacks and
                  Impossible Differential Attacks against Simon Variants},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {518--536},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_28},
  doi          = {10.1007/978-3-319-39555-5\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KondoSI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KoppulaPRW16,
  author       = {Venkata Koppula and
                  Omkant Pandey and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Deterministic Public-Key Encryption Under Continual Leakage},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {304--323},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_17},
  doi          = {10.1007/978-3-319-39555-5\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KoppulaPRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LancrenonST16,
  author       = {Jean Lancrenon and
                  Marjan Skrobot and
                  Qiang Tang},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Two More Efficient Variants of the {J-PAKE} Protocol},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_4},
  doi          = {10.1007/978-3-319-39555-5\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LancrenonST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LestringantGF16,
  author       = {Pierre Lestringant and
                  Fr{\'{e}}d{\'{e}}ric Guih{\'{e}}ry and
                  Pierre{-}Alain Fouque},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Assisted Identification of Mode of Operation in Binary Code with Dynamic
                  Data Flow Slicing},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {561--579},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_30},
  doi          = {10.1007/978-3-319-39555-5\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LestringantGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LibertMN16,
  author       = {Beno{\^{\i}}t Libert and
                  Fabrice Mouhartem and
                  Khoa Nguyen},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {A Lattice-Based Group Signature Scheme with Message-Dependent Opening},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_8},
  doi          = {10.1007/978-3-319-39555-5\_8},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LibertMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuWR16,
  author       = {Yunwen Liu and
                  Qingju Wang and
                  Vincent Rijmen},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Automatic Search of Linear Trails in {ARX} with Applications to {SPECK}
                  and Chaskey},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {485--499},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_26},
  doi          = {10.1007/978-3-319-39555-5\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MengLWZ16,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Duncan S. Wong and
                  Jianying Zhou},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {TMGuard: {A} Touch Movement-Based Security Mechanism for Screen Unlock
                  Patterns on Smartphones},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {629--647},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_34},
  doi          = {10.1007/978-3-319-39555-5\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MengLWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NiHCA16,
  author       = {Xiejun Ni and
                  Daojing He and
                  Sammy Chan and
                  Farooq Ahmad},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Network Anomaly Detection Using Unsupervised Feature Selection and
                  Density Peak Clustering},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {212--227},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_12},
  doi          = {10.1007/978-3-319-39555-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NiHCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Ramanna16,
  author       = {Somindu C. Ramanna},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {More Efficient Constructions for Inner-Product Encryption},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {231--248},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_13},
  doi          = {10.1007/978-3-319-39555-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Ramanna16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchoenmakersVV16,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen and
                  Niels de Vreede},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable
                  Computation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {346--366},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_19},
  doi          = {10.1007/978-3-319-39555-5\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchoenmakersVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TodoA16,
  author       = {Yosuke Todo and
                  Kazumaro Aoki},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower
                  Bound of Number of Active S-boxes},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_25},
  doi          = {10.1007/978-3-319-39555-5\_25},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TodoA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5},
  doi          = {10.1007/978-3-319-39555-5},
  isbn         = {978-3-319-39554-8},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics