Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

  • Michael Jacobson
  • Michael Locasto
  • Payman Mohassel
  • Reihaneh Safavi-Naini

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7954)

Table of contents

  1. Front Matter
  2. Cloud Cryptography

    1. Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
      Pages 19-36
    2. Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
      Pages 37-52
    3. Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
      Pages 53-68
  3. Secure Computation

    1. Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
      Pages 69-83
    2. Sven Laur, Riivo Talviste, Jan Willemson
      Pages 84-101
    3. Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
      Pages 102-118
  4. Hash Function and Block Cipher

    1. Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
      Pages 119-135
  5. Signature

    1. Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
      Pages 186-201
    2. Kwangsu Lee, Dong Hoon Lee, Moti Yung
      Pages 202-217
  6. Group-Oriented Cryptography

    1. Rikke Bendlin, Sara Krehbiel, Chris Peikert
      Pages 218-236
    2. Laila El Aimani, Marc Joye
      Pages 237-252
  7. System Attack I

    1. Matthias Schäfer, Vincent Lenders, Ivan Martinovic
      Pages 253-271
    2. Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao et al.
      Pages 272-289
  8. Secure Implementation – Hardware

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.


authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Michael Jacobson
    • 1
  • Michael Locasto
    • 1
  • Payman Mohassel
    • 1
  • Reihaneh Safavi-Naini
    • 1
  1. 1.University of CalgaryCanada

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38979-5
  • Online ISBN 978-3-642-38980-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site