Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

ISBN: 978-3-642-38979-5 (Print) 978-3-642-38980-1 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cloud Cryptography

    1. No Access

      Book Chapter

      Pages 1-18

      Transparent, Distributed, and Replicated Dynamic Provable Data Possession

    2. No Access

      Book Chapter

      Pages 19-36

      Client-Controlled Cryptography-as-a-Service in the Cloud

    3. No Access

      Book Chapter

      Pages 37-52

      CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

    4. No Access

      Book Chapter

      Pages 53-68

      Computing on Authenticated Data for Adjustable Predicates

  3. Secure Computation

    1. No Access

      Book Chapter

      Pages 69-83

      Towards Efficient Private Distributed Computation on Unbounded Input Streams

    2. No Access

      Book Chapter

      Pages 84-101

      From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting

    3. No Access

      Book Chapter

      Pages 102-118

      Private Database Queries Using Somewhat Homomorphic Encryption

  4. Hash Function and Block Cipher

    1. No Access

      Book Chapter

      Pages 119-135

      BLAKE2: Simpler, Smaller, Fast as MD5

    2. No Access

      Book Chapter

      Pages 136-153

      Cryptophia’s Short Combiner for Collision-Resistant Hash Functions

    3. No Access

      Book Chapter

      Pages 154-169

      Generic Attacks for the Xor of k Random Permutations

    4. No Access

      Book Chapter

      Pages 170-185

      Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist

  5. Signature

    1. No Access

      Book Chapter

      Pages 186-201

      Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles

    2. No Access

      Book Chapter

      Pages 202-217

      Sequential Aggregate Signatures Made Shorter

  6. Group-Oriented Cryptography

    1. No Access

      Book Chapter

      Pages 218-236

      How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE

    2. No Access

      Book Chapter

      Pages 237-252

      Toward Practical Group Encryption

  7. System Attack I

    1. No Access

      Book Chapter

      Pages 253-271

      Experimental Analysis of Attacks on Next Generation Air Traffic Communication

    2. No Access

      Book Chapter

      Pages 272-289

      Launching Generic Attacks on iOS with Approved Third-Party Applications

  8. Secure Implementation – Hardware

    1. No Access

      Book Chapter

      Pages 290-306

      Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography

    2. No Access

      Book Chapter

      Pages 307-321

      Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors

  9. Secure Implementation – Software

    1. No Access

      Book Chapter

      Pages 322-338

      NEON Implementation of an Attribute-Based Encryption Scheme

previous Page of 2