Limit search to available items
Book Cover
E-book
Author ACNS (Conference) (11th : 2013 : Banff, Alta.)

Title Applied cryptography and network security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 : proceedings / Michael Jacobson [and others]. (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource (xiv, 572 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 7954
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7954. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Cloud Cryptography. Transparent, Distributed, and Replicated Dynamic Provable Data Possession / Mohammad Etemad, Alptekin Küpçü -- Client-Controlled Cryptography-as-a-Service in the Cloud / Sören Bleikertz [and others] -- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing / Yi-Ruei Chen [and others] -- Computing on Authenticated Data for Adjustable Predicates / Björn Deiseroth [and others] -- Secure Computation. Towards Efficient Private Distributed Computation on Unbounded Input Streams / Shlomi Dolev [and others] -- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting / Sven Laur, Riivo Talviste, Jan Willemson -- Private Database Queries Using Somewhat Homomorphic Encryption / Dan Boneh [and others] -- Hash Function and Block Cipher. BLAKE2: Simpler, Smaller, Fast as MD5 / Jean-Philippe Aumasson [and others]
Cryptophia's Short Combiner for Collision-Resistant Hash Functions / Arno Mittelbach -- Generic Attacks for the Xor of k Random Permutations / Jacques Patarin -- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist / Yu Sasaki -- Signature. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles / Xiangxue Li [and others] -- Sequential Aggregate Signatures Made Shorter / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- Group-Oriented Cryptography. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE / Rikke Bendlin, Sara Krehbiel, Chris Peikert -- Toward Practical Group Encryption / Laila El Aimani, Marc Joye -- System Attack I. Experimental Analysis of Attacks on Next Generation Air Traffic Communication / Matthias Schäfer, Vincent Lenders, Ivan Martinovic -- Launching Generic Attacks on iOS with Approved Third-Party Applications / Jin Han [and others]
Secure Implementation -- Hardware. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography / Erich Wenger -- Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors / Michael Henson, Stephen Taylor -- Secure Implementation -- Software. NEON Implementation of an Attribute-Based Encryption Scheme / Ana Helena Sánchez, Francisco Rodríguez-Henríquez -- Fast and Maliciously Secure Two-Party Computation Using the GPU / Tore Kasper Frederiksen, Jesper Buus Nielsen -- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves / Aurore Guillevic -- System Attack II. FROST / Tilo Müller, Michael Spreitzenbarth -- Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware / Alexander Wild, Tim Güneysu, Amir Moradi -- Keystroke Timing Analysis of on-the-fly Web Apps / Chee Meng Tey [and others]
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance / Marc Fischlin, Cristina Onete -- Group-Oriented Systems. CrowdShare: Secure Mobile Resource Sharing / N. Asokan [and others] -- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System / Filip Zagórski [and others] -- Key Exchange and Leakage Resilience. Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles / Koutarou Suzuki, Kazuki Yoneyama -- Public Key Exchange Using Semidirect Product of (Semi)Groups / Maggie Habeeb [and others] -- Leakage Resilient IBE and IPE under the DLIN Assumption / Kaoru Kurosawa, Le Trieu Phong -- Cryptographic Proof. Batch Proofs of Partial Knowledge / Ryan Henry, Ian Goldberg -- Efficient Signatures of Knowledge and DAA in the Standard Model / David Bernhard, Georg Fuchsbauer, Essam Ghadafi -- Cryptosystems. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes / Olivier Blazy [and others] -- Primeless Factoring-Based Cryptography / Sonia Bogos, Ioana Boureanu, Serge Vaudenay
Summary This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems
Analysis Computer science
Computer Communication Networks
Data protection
Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Coding and Information Theory
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed July 3, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Cloud computing -- Congresses
Computer security.
Computer Communications Networks
Computer Security
Computer security
Cloud computing
Computer networks -- Security measures
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Jacobson, Michael (Computer scientist)
ISBN 9783642389801
3642389805
Other Titles ACNS 2013