Advertisement

Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

  • Michael Jacobson
  • Michael Locasto
  • Payman Mohassel
  • Reihaneh Safavi-Naini

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7954)

Table of contents

  1. Front Matter
  2. Cloud Cryptography

    1. Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
      Pages 19-36
    2. Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
      Pages 37-52
    3. Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
      Pages 53-68
  3. Secure Computation

    1. Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
      Pages 69-83
    2. Sven Laur, Riivo Talviste, Jan Willemson
      Pages 84-101
    3. Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
      Pages 102-118
  4. Hash Function and Block Cipher

    1. Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
      Pages 119-135
  5. Signature

    1. Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
      Pages 186-201
    2. Kwangsu Lee, Dong Hoon Lee, Moti Yung
      Pages 202-217
  6. Group-Oriented Cryptography

    1. Rikke Bendlin, Sara Krehbiel, Chris Peikert
      Pages 218-236
    2. Laila El Aimani, Marc Joye
      Pages 237-252
  7. System Attack I

    1. Matthias Schäfer, Vincent Lenders, Ivan Martinovic
      Pages 253-271
    2. Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao et al.
      Pages 272-289
  8. Secure Implementation – Hardware

  9. Secure Implementation – Software

    1. Ana Helena Sánchez, Francisco Rodríguez-Henríquez
      Pages 322-338
    2. Tore Kasper Frederiksen, Jesper Buus Nielsen
      Pages 339-356
  10. System Attack II

    1. Tilo Müller, Michael Spreitzenbarth
      Pages 373-388
    2. Alexander Wild, Tim Güneysu, Amir Moradi
      Pages 389-404
    3. Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang
      Pages 405-413
    4. Marc Fischlin, Cristina Onete
      Pages 414-431
  11. Group-Oriented Systems

    1. N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider et al.
      Pages 432-440
    2. Filip Zagórski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
      Pages 441-457
  12. Key Exchange and Leakage Resilience

    1. Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
      Pages 475-486
    2. Kaoru Kurosawa, Le Trieu Phong
      Pages 487-501
  13. Cryptographic Proof

    1. Ryan Henry, Ian Goldberg
      Pages 502-517
    2. David Bernhard, Georg Fuchsbauer, Essam Ghadafi
      Pages 518-533
  14. Cryptosystems

    1. Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
      Pages 534-551
    2. Sonia Bogos, Ioana Boureanu, Serge Vaudenay
      Pages 552-569
  15. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Keywords

authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Michael Jacobson
    • 1
  • Michael Locasto
    • 1
  • Payman Mohassel
    • 1
  • Reihaneh Safavi-Naini
    • 1
  1. 1.University of CalgaryCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-38980-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38979-5
  • Online ISBN 978-3-642-38980-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site