Applied Cryptography and Network Security

12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

  • Ioana Boureanu
  • Philippe Owesarski
  • Serge Vaudenay
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8479)

Table of contents

  1. Front Matter
  2. Key Exchange

    1. Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk
      Pages 1-18
    2. M. Kreuzer, A. D. Myasnikov, A. Ushakov
      Pages 37-43
  3. Primitive Construction

    1. Kevin Lewi, Hart Montgomery, Ananth Raghunathan
      Pages 44-61
    2. Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 62-79
    3. Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
      Pages 80-96
    4. Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 116-133
  4. Attacks (Public-Key Cryptography)

    1. Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
      Pages 134-150
    2. Taechan Kim, Mehdi Tibouchi
      Pages 163-180
  5. Hashing

    1. Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
      Pages 181-198
    2. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 217-234
    3. Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
      Pages 235-252
  6. Cryptanalysis & Attacks (Symmetric Cryptography)

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Keywords

RSA authenticated key exchange cryptanalysis and other attacks cryptographic primitives cryptography hash functions intrusion detection key management mathematical foundations of cryptography network security public key techniques secure computation security services signatures software and application security symmetric cryptography systems security

Editors and affiliations

  • Ioana Boureanu
    • 1
  • Philippe Owesarski
    • 2
  • Serge Vaudenay
    • 3
  1. 1.Akamai EMEAAddlestoneUK
  2. 2.LAAS-CNRS, SARAToulouseFrance
  3. 3.IC LASECEcole Polytechnique Fédérale de Lausanne (EPFL)LausanneSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-07536-5
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-07535-8
  • Online ISBN 978-3-319-07536-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book