Skip to main content
  • Conference proceedings
  • © 2014

Applied Cryptography and Network Security

12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8479)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Key Exchange

    1. New Modular Compilers for Authenticated Key Exchange

      • Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk
      Pages 1-18
    2. A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols

      • M. Kreuzer, A. D. Myasnikov, A. Ushakov
      Pages 37-43
  3. Primitive Construction

    1. Improved Constructions of PRFs Secure Against Related-Key Attacks

      • Kevin Lewi, Hart Montgomery, Ananth Raghunathan
      Pages 44-61
    2. Verifiable Multi-server Private Information Retrieval

      • Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 62-79
    3. Certified Bitcoins

      • Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
      Pages 80-96
    4. Private Message Transmission Using Disjoint Paths

      • Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 116-133
  4. Attacks (Public-Key Cryptography)

    1. Partial Key Exposure Attacks on Takagi’s Variant of RSA

      • Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
      Pages 134-150
    2. Bit-Flip Faults on Elliptic Curve Base Fields, Revisited

      • Taechan Kim, Mehdi Tibouchi
      Pages 163-180
  5. Hashing

    1. All-but-One Dual Projective Hashing and Its Applications

      • Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
      Pages 181-198
    2. Sakura: A Flexible Coding for Tree Hashing

      • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 217-234
    3. Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions

      • Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
      Pages 235-252
  6. Cryptanalysis & Attacks (Symmetric Cryptography)

    1. Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function

      • Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
      Pages 289-307
    2. Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro

      • Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
      Pages 308-323

Other Volumes

  1. Applied Cryptography and Network Security

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Editors and Affiliations

  • Akamai EMEA, Addlestone, UK

    Ioana Boureanu

  • LAAS-CNRS, SARA, Toulouse, France

    Philippe Owesarski

  • IC LASEC, Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

  • Book Title: Applied Cryptography and Network Security

  • Book Subtitle: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

  • Editors: Ioana Boureanu, Philippe Owesarski, Serge Vaudenay

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-07536-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-07535-8Published: 01 July 2014

  • eBook ISBN: 978-3-319-07536-5Published: 05 June 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVIII, 586

  • Number of Illustrations: 127 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Theory of Computation

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access