Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

  • Michael Jacobson
  • Michael Locasto
  • Payman Mohassel
  • Reihaneh Safavi-Naini
Conference proceedings ACNS 2013
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7954)

Table of contents

  1. Secure Implementation – Software

    1. Ana Helena Sánchez, Francisco Rodríguez-Henríquez
      Pages 322-338
    2. Tore Kasper Frederiksen, Jesper Buus Nielsen
      Pages 339-356
  2. System Attack II

    1. Tilo Müller, Michael Spreitzenbarth
      Pages 373-388
    2. Alexander Wild, Tim Güneysu, Amir Moradi
      Pages 389-404
    3. Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang
      Pages 405-413
    4. Marc Fischlin, Cristina Onete
      Pages 414-431
  3. Group-Oriented Systems

    1. N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider et al.
      Pages 432-440
    2. Filip Zagórski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
      Pages 441-457
  4. Key Exchange and Leakage Resilience

    1. Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
      Pages 475-486
    2. Kaoru Kurosawa, Le Trieu Phong
      Pages 487-501
  5. Cryptographic Proof

    1. Ryan Henry, Ian Goldberg
      Pages 502-517
    2. David Bernhard, Georg Fuchsbauer, Essam Ghadafi
      Pages 518-533
  6. Cryptosystems

    1. Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
      Pages 534-551
    2. Sonia Bogos, Ioana Boureanu, Serge Vaudenay
      Pages 552-569
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Keywords

authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Michael Jacobson
    • 1
  • Michael Locasto
    • 1
  • Payman Mohassel
    • 1
  • Reihaneh Safavi-Naini
    • 1
  1. 1.University of CalgaryCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-38980-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38979-5
  • Online ISBN 978-3-642-38980-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book