| Title: |
Ensuring Authentication of Digital Information using Cryptographic Accumulators |
| Authors: |
Christophe Tartary |
| Affiliations: |
Institute for Theoretical Computer Science - Tsinghua University - Beijing, P. R. China |
| Title: |
A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle |
| Authors: |
Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wan |
| Affiliations: |
Nanjing University of Aeronautics and Astronautics, China and University of Wollongong, Australia |
| Title: |
An Analysis of the Compact XSL Attack on BES and Embedded SMS4 |
| Authors: |
Jiali Choy, Huihui Yap, and Khoongming Khoo |
| Affiliations: |
DSO National Laboratories |
| Title: |
Short Hash-based Signatures for Wireless Sensor Networks |
| Authors: |
Erik Dahmen and Christoph Kraus |
| Affiliations: |
Technische Universitat Darmstadt, Fraunhofer-Institute for Secure Information Technology (SIT) |
| Title: |
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity |
| Authors: |
Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu |
| Affiliations: |
National University of Defence Technology, China, University of Tokyo, Japan |
| Title: |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards |
| Authors: |
Wen-Ting Jin and Jing Xu |
| Affiliations: |
State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences |
| Title: |
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves |
| Authors: |
Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari, and Francisco Rodriguez-Henriquez |
| Affiliations: |
University of Tsukuba (Japan), Centro de Investigacion y de Estudios Avanzados del IPN (Mexico), Cybozu Labs (Japan), and Intel - Guadalajara (Mexico) |
| Title: |
On the Complexity of Computing Discrete Logarithms over Algebraic Tori |
| Authors: |
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, and Hiroki Shizuya |
| Affiliations: |
Graduate School of Information Sciences, Tohoku University |
| Title: |
RFID distance bounding protocol with mixed challenges to prevent relay attacks |
| Authors: |
Chong Hee Kim and Gildas Avoine |
| Affiliations: |
UCL (Universite Catholique de Louvain), Belgium |
| Title: |
Improving the Rainbow Attack by Reusing Colours |
| Authors: |
Martin Agren, Thomas Johansson, and Martin Hell |
| Affiliations: |
Lund University |
| Title: |
Saturation Attack on the Block Cipher HIGHT |
| Authors: |
Peng Zhang, Bing Sun, and Chao Li |
| Affiliations: |
Mathematics and System Science of National University of Defence Technology |
| Title: |
Fully Robust Tree-Diffie-Hellman Group Key Exchange |
| Authors: |
Mark Manulis, Emmanuel Bresson and Timo Brecher |
| Affiliations: |
TU Darmstadt, DCSSI Crypto Lab, and INFODAS |
| Title: |
Extensions of the Cube Attack based on Low Degree Annihilators |
| Authors: |
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, and Josef Pieprzyk |
| Affiliations: |
DSO National Laboratories School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. Macquarie University, Australia. |
| Title: |
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes |
| Authors: |
Nitesh Saxena and Md. Borhan Uddin |
| Affiliations: |
Polytechnic Institute of New York University |
| Title: |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning |
| Authors: |
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, and Yue-Hsun Lin |
| Affiliations: |
Department of Computer Science, National Tsing Hua University Sec. 2, Kung-Fu Rd., HsinChu, Taiwan 30013 |
| Title: |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring |
| Authors: |
Marc Joye |
| Affiliations: |
Thomson R&D |
| Title: |
Private-Key Hidden Vector Encryption with Key Privacy |
| Authors: |
Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano |
| Affiliations: |
Dip. Informatica ed Appl., Universita' di Salerno, Salerno, Italy |
| Title: |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security |
| Authors: |
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, and Pandu Rangan C |
| Affiliations: |
NIT Trichy, ITBHU,IIT Madras |
| Title: |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT |
| Authors: |
Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang, and Meiqin Wang |
| Affiliations: |
EPFL, Lausanne, Switzerland, University College London, UK, Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, China |
| Title: |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model |
| Authors: |
Benoit Libert and Damien Vergnaud |
| Affiliations: |
UCL Crypto Group and Ecole Normale Superieure |
| Title: |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima |
| Authors: |
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider |
| Affiliations: |
Bell Laboratories, Ruhr University Bochum |
| Title: |
Anonymizer-Enabled Security and Privacy for RFID |
| Authors: |
Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann |
| Affiliations: |
Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Germany and Dipartimento di Informatica ed Applicazioni, University of Salerno, Italy |
| Title: |
Transferable Anonymous Constant-Size Fair E-Cash |
| Authors: |
Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud |
| Affiliations: |
Ecole normale superieure, LIENS - CNRS - INRIA, Paris, France |
| Title: |
Side Channel Cube Attack on PRESENT |
| Authors: |
Lin Yang, Meiqin Wang and Siyuan Qiao |
| Affiliations: |
Shandong University, China. |
| Title: |
On the Usability of Secure Association of Wireless Devices Based On Distance Bounding |
| Authors: |
Mario Cagalj, Nitesh Saxena, and Ersin Uzun |
| Affiliations: |
University of Split, Polytechnic Institute of New York University, UC Irvine |
| Title: |
Distinguishing and Second-Preimage Attack on CBC-like MACs |
| Authors: |
Keting Jia, Xiaoyun Wang, Zheng Yuan, and Guangwu Xu |
| Affiliations: |
Shandong University, China |
| Title: |
Relinkable Ring Signature |
| Authors: |
Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi |
| Affiliations: |
NTT Corporation and IPA |
| Title: |
MIBS: A New Lightweight Block Cipher |
| Authors: |
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, and Hossein Arabnezhad Khanooki |
| Affiliations: |
Amirkabir University of Technology |
| Title: |
Verifying Anonymous Credential Systems in Applied Pi Calculus |
| Authors: |
Xiangxi Li, Yu Zhang, and Yuxin Deng |
| Affiliations: |
Shanghai Jiatong University, China. Institute of Software, Chinese Academy of Science, China. |
| Title: |
Algebraic Attack on the MQQ Public Key Cryptosystem |
| Authors: |
Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding, and Johannes Buchmann |
| Affiliations: |
TU-Darmstadt |
| Title: |
Stronger Password Authentication against Cross-Site Impersonation |
| Authors: |
Xavier Boyen |
| Affiliations: |
Stanford University |
| Title: |
Privacy-Preserving Relationship Path Discovery in Social Networks |
| Authors: |
Ghita Mezzour, Adrian Perrig, Virgil Gligor, and Panos Papadimitratos |
| Affiliations: |
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Ecole Polytechnique Federale de Lausanne |