Skip to main content
  • Conference proceedings
  • © 2014

Applied Cryptography and Network Security

12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8479)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2014.

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-07536-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (33 papers)

  1. Front Matter

  2. Key Exchange

    1. New Modular Compilers for Authenticated Key Exchange

      • Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk
      Pages 1-18
    2. A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols

      • M. Kreuzer, A. D. Myasnikov, A. Ushakov
      Pages 37-43
  3. Primitive Construction

    1. Improved Constructions of PRFs Secure Against Related-Key Attacks

      • Kevin Lewi, Hart Montgomery, Ananth Raghunathan
      Pages 44-61
    2. Verifiable Multi-server Private Information Retrieval

      • Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 62-79
    3. Certified Bitcoins

      • Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
      Pages 80-96
    4. Private Message Transmission Using Disjoint Paths

      • Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 116-133
  4. Attacks (Public-Key Cryptography)

    1. Partial Key Exposure Attacks on Takagi’s Variant of RSA

      • Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
      Pages 134-150
    2. Bit-Flip Faults on Elliptic Curve Base Fields, Revisited

      • Taechan Kim, Mehdi Tibouchi
      Pages 163-180
  5. Hashing

    1. All-but-One Dual Projective Hashing and Its Applications

      • Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
      Pages 181-198
    2. Sakura: A Flexible Coding for Tree Hashing

      • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 217-234
    3. Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions

      • Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
      Pages 235-252
  6. Cryptanalysis & Attacks (Symmetric Cryptography)

    1. Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function

      • Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
      Pages 289-307
    2. Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro

      • Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
      Pages 308-323

Other Volumes

  1. Applied Cryptography and Network Security

    12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Keywords

  • RSA
  • authenticated key exchange
  • cryptanalysis and other attacks
  • cryptographic primitives
  • cryptography
  • hash functions
  • intrusion detection
  • key management
  • mathematical foundations of cryptography
  • network security
  • public key techniques
  • secure computation
  • security services
  • signatures
  • software and application security
  • symmetric cryptography
  • systems security

Editors and Affiliations

  • Akamai EMEA, Addlestone, UK

    Ioana Boureanu

  • LAAS-CNRS, SARA, Toulouse, France

    Philippe Owesarski

  • IC LASEC, Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

  • Book Title: Applied Cryptography and Network Security

  • Book Subtitle: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

  • Editors: Ioana Boureanu, Philippe Owesarski, Serge Vaudenay

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-07536-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-07535-8

  • eBook ISBN: 978-3-319-07536-5

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVIII, 586

  • Number of Illustrations: 127 b/w illustrations

  • Topics: Data and Information Security, Cryptology, Theory of Computation

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-07536-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)