Title: |
Ensuring Authentication of Digital Information using Cryptographic Accumulators |
Authors: |
Christophe Tartary |
Affiliations: |
Institute for Theoretical Computer Science - Tsinghua University - Beijing, P. R. China |
Title: |
A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle |
Authors: |
Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wan |
Affiliations: |
Nanjing University of Aeronautics and Astronautics, China and University of Wollongong, Australia |
Title: |
An Analysis of the Compact XSL Attack on BES and Embedded SMS4 |
Authors: |
Jiali Choy, Huihui Yap, and Khoongming Khoo |
Affiliations: |
DSO National Laboratories |
Title: |
Short Hash-based Signatures for Wireless Sensor Networks |
Authors: |
Erik Dahmen and Christoph Kraus |
Affiliations: |
Technische Universitat Darmstadt, Fraunhofer-Institute for Secure Information Technology (SIT) |
Title: |
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity |
Authors: |
Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu |
Affiliations: |
National University of Defence Technology, China, University of Tokyo, Japan |
Title: |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards |
Authors: |
Wen-Ting Jin and Jing Xu |
Affiliations: |
State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences |
Title: |
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves |
Authors: |
Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari, and Francisco Rodriguez-Henriquez |
Affiliations: |
University of Tsukuba (Japan), Centro de Investigacion y de Estudios Avanzados del IPN (Mexico), Cybozu Labs (Japan), and Intel - Guadalajara (Mexico) |
Title: |
On the Complexity of Computing Discrete Logarithms over Algebraic Tori |
Authors: |
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, and Hiroki Shizuya |
Affiliations: |
Graduate School of Information Sciences, Tohoku University |
Title: |
RFID distance bounding protocol with mixed challenges to prevent relay attacks |
Authors: |
Chong Hee Kim and Gildas Avoine |
Affiliations: |
UCL (Universite Catholique de Louvain), Belgium |
Title: |
Improving the Rainbow Attack by Reusing Colours |
Authors: |
Martin Agren, Thomas Johansson, and Martin Hell |
Affiliations: |
Lund University |
Title: |
Saturation Attack on the Block Cipher HIGHT |
Authors: |
Peng Zhang, Bing Sun, and Chao Li |
Affiliations: |
Mathematics and System Science of National University of Defence Technology |
Title: |
Fully Robust Tree-Diffie-Hellman Group Key Exchange |
Authors: |
Mark Manulis, Emmanuel Bresson and Timo Brecher |
Affiliations: |
TU Darmstadt, DCSSI Crypto Lab, and INFODAS |
Title: |
Extensions of the Cube Attack based on Low Degree Annihilators |
Authors: |
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, and Josef Pieprzyk |
Affiliations: |
DSO National Laboratories School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. Macquarie University, Australia. |
Title: |
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes |
Authors: |
Nitesh Saxena and Md. Borhan Uddin |
Affiliations: |
Polytechnic Institute of New York University |
Title: |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning |
Authors: |
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, and Yue-Hsun Lin |
Affiliations: |
Department of Computer Science, National Tsing Hua University Sec. 2, Kung-Fu Rd., HsinChu, Taiwan 30013 |
Title: |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring |
Authors: |
Marc Joye |
Affiliations: |
Thomson R&D |
Title: |
Private-Key Hidden Vector Encryption with Key Privacy |
Authors: |
Carlo Blundo, Vincenzo Iovino, and Giuseppe Persiano |
Affiliations: |
Dip. Informatica ed Appl., Universita' di Salerno, Salerno, Italy |
Title: |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security |
Authors: |
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, and Pandu Rangan C |
Affiliations: |
NIT Trichy, ITBHU,IIT Madras |
Title: |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT |
Authors: |
Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang, and Meiqin Wang |
Affiliations: |
EPFL, Lausanne, Switzerland, University College London, UK, Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, China |
Title: |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model |
Authors: |
Benoit Libert and Damien Vergnaud |
Affiliations: |
UCL Crypto Group and Ecole Normale Superieure |
Title: |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima |
Authors: |
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider |
Affiliations: |
Bell Laboratories, Ruhr University Bochum |
Title: |
Anonymizer-Enabled Security and Privacy for RFID |
Authors: |
Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann |
Affiliations: |
Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Germany and Dipartimento di Informatica ed Applicazioni, University of Salerno, Italy |
Title: |
Transferable Anonymous Constant-Size Fair E-Cash |
Authors: |
Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud |
Affiliations: |
Ecole normale superieure, LIENS - CNRS - INRIA, Paris, France |
Title: |
Side Channel Cube Attack on PRESENT |
Authors: |
Lin Yang, Meiqin Wang and Siyuan Qiao |
Affiliations: |
Shandong University, China. |
Title: |
On the Usability of Secure Association of Wireless Devices Based On Distance Bounding |
Authors: |
Mario Cagalj, Nitesh Saxena, and Ersin Uzun |
Affiliations: |
University of Split, Polytechnic Institute of New York University, UC Irvine |
Title: |
Distinguishing and Second-Preimage Attack on CBC-like MACs |
Authors: |
Keting Jia, Xiaoyun Wang, Zheng Yuan, and Guangwu Xu |
Affiliations: |
Shandong University, China |
Title: |
Relinkable Ring Signature |
Authors: |
Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi |
Affiliations: |
NTT Corporation and IPA |
Title: |
MIBS: A New Lightweight Block Cipher |
Authors: |
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, and Hossein Arabnezhad Khanooki |
Affiliations: |
Amirkabir University of Technology |
Title: |
Verifying Anonymous Credential Systems in Applied Pi Calculus |
Authors: |
Xiangxi Li, Yu Zhang, and Yuxin Deng |
Affiliations: |
Shanghai Jiatong University, China. Institute of Software, Chinese Academy of Science, China. |
Title: |
Algebraic Attack on the MQQ Public Key Cryptosystem |
Authors: |
Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding, and Johannes Buchmann |
Affiliations: |
TU-Darmstadt |
Title: |
Stronger Password Authentication against Cross-Site Impersonation |
Authors: |
Xavier Boyen |
Affiliations: |
Stanford University |
Title: |
Privacy-Preserving Relationship Path Discovery in Social Networks |
Authors: |
Ghita Mezzour, Adrian Perrig, Virgil Gligor, and Panos Papadimitratos |
Affiliations: |
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Ecole Polytechnique Federale de Lausanne |