Advertisement

Applied Cryptography and Network Security

16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings

  • Bart Preneel
  • Frederik Vercauteren

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10892)

Also part of the Security and Cryptology book sub series (LNSC, volume 10892)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Cryptographic Protocols

    1. Front Matter
      Pages 1-1
    2. Benjamin Dowling, Kenneth G. Paterson
      Pages 3-21
    3. Yotam Harchol, Ittai Abraham, Benny Pinkas
      Pages 22-43
    4. Georg Fuchsbauer, Michele Orrù
      Pages 44-62
  3. Side Channel Attacks and Tamper Resistance

    1. Front Matter
      Pages 63-63
    2. Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
      Pages 83-102
    3. Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
      Pages 103-120
    4. Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
      Pages 121-139
  4. Digital Signatures

    1. Front Matter
      Pages 141-141
    2. Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
      Pages 143-162
    3. Cecilia Boschini, Jan Camenisch, Gregory Neven
      Pages 163-182
    4. Dario Catalano, Dario Fiore, Luca Nizzardo
      Pages 183-201
  5. Privacy Preserving Computation

    1. Front Matter
      Pages 241-241
    2. Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
      Pages 243-261
    3. Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
      Pages 262-279
    4. Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
      Pages 280-300
  6. Multi-party Computation

    1. Front Matter
      Pages 301-301
    2. Peter Sebastian Nordholt, Meilof Veeningen
      Pages 321-339
    3. Daniel Genkin, S. Dov Gordon, Samuel Ranellucci
      Pages 340-359
    4. Stanislaw Jarecki, Boyang Wei
      Pages 360-378
  7. Symmetric Key Primitives

    1. Front Matter
      Pages 379-379
    2. Ralph Ankele, Florian Böhl, Simon Friedberger
      Pages 381-399
    3. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
      Pages 400-418
  8. Symmetric Key Cryptanalysis

    1. Front Matter
      Pages 419-419
    2. Ralph Ankele, Eik List
      Pages 459-475
    3. Serge Vaudenay, Damian Vizár
      Pages 476-494
  9. Public Key Encryption

    1. Front Matter
      Pages 495-495
    2. Jiangtao Li, Junqing Gong
      Pages 497-515
    3. Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
      Pages 516-534
  10. Authentication and Biometrics

    1. Front Matter
      Pages 555-555
    2. Mamunur Rashid Akand, Reihaneh Safavi-Naini
      Pages 557-578
    3. Handan Kılınç, Serge Vaudenay
      Pages 579-597
  11. Cloud and Peer-to-Peer Security

    1. Front Matter
      Pages 635-635
    2. Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
      Pages 637-656
    3. Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena
      Pages 657-677
    4. Suyash Kandele, Souradyuti Paul
      Pages 678-695
    5. Seny Kamara, Alptekin Küpçü
      Pages 696-714
  12. Back Matter
    Pages 715-716

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.

The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Keywords

access control authentication bandwidth ciphertexts cloud security computer crime cryptography data mining data privacy digital signature electronic document identification systems encryption multi-party computation privacy project management public key cryptography security protocols security systems software engineering structural design

Editors and affiliations

  1. 1.imec-COSICKU LeuvenHeverleeBelgium
  2. 2.imec-COSICKU LeuvenHeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-93387-0
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-93386-3
  • Online ISBN 978-3-319-93387-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site