Skip to main content
  • Conference proceedings
  • © 2017

Applied Cryptography and Network Security

15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10355)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2017.

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-61204-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (34 papers)

  1. Front Matter

    Pages I-XVI
  2. Applied Cryptography

    1. Front Matter

      Pages 1-1
    2. Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography

      • Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Ricosset
      Pages 3-19
    3. Simple Security Definitions for and Constructions of 0-RTT Key Exchange

      • Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
      Pages 20-38
    4. TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF

      • Stanisław Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
      Pages 39-58
    5. Secure and Efficient Pairing at 256-Bit Security Level

      • Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi
      Pages 59-79
  3. Data Protection and Mobile Security

    1. Front Matter

      Pages 81-81
    2. No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices

      • Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran
      Pages 83-102
    3. Are You Lying: Validating the Time-Location of Outdoor Images

      • Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu
      Pages 103-123
    4. Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

      • Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik
      Pages 124-144
    5. A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

      • Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang, Jianying Zhou
      Pages 145-162
  4. Security Analysis

    1. Front Matter

      Pages 163-163
    2. A Novel GPU-Based Implementation of the Cube Attack

      • Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini
      Pages 184-207
    3. Related-Key Impossible-Differential Attack on Reduced-Round Skinny

      • Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim et al.
      Pages 208-228
    4. Faster Secure Multi-party Computation of AES and DES Using Lookup Tables

      • Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
      Pages 229-249
  5. Cryptographic Primitives

    1. Front Matter

      Pages 251-251
    2. An Experimental Study of the BDD Approach for the Search LWE Problem

      • Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto et al.
      Pages 253-272
    3. Efficiently Obfuscating Re-Encryption Program Under DDH Assumption

      • Akshayaram Srinivasan, Chandrasekaran Pandu Rangan
      Pages 273-292
    4. Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease

      • San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
      Pages 293-312

Other Volumes

  1. Applied Cryptography and Network Security

    15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings

About this book

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017.

The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Keywords

  • algorithms
  • applied computing
  • authentication
  • block ciphers
  • computer networks
  • construction
  • cryptanalysis
  • cryptographic protocols
  • cryptography
  • data security
  • digital signature
  • discrete logarithms
  • electronic document identification systems
  • encryption
  • lattice-based cryptography
  • privacy
  • public key cryptography
  • security
  • side-channel attack
  • software engineering

Editors and Affiliations

  • Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • Graduate School of Engineering, Osaka University, Suita, Japan

    Atsuko Miyaji

  • Department of Frontier Media Science, Meiji University, Tokyo, Japan

    Hiroaki Kikuchi

Bibliographic Information

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-61204-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.99
Price excludes VAT (USA)