Broadcast Encryption and Traitor Tracing |
Multi-service Oriented Broadcast Encryption / Shaoquan Jiang ; Guang Gong |
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme / Tomoyuki Asano |
Linear Code Implies Public-Key Traitor Tracing With Revocation / Vu Dong Tô ; Reihaneh Safavi-Naini |
TTS Without Revocation Capability Secure Against CCA2 / Chong Hee Kim ; Yong Ho Hwang ; Pil Joong Lee |
Private Information Retrieval and Oblivious Transfer |
Single Database Private Information Retrieval With Logarithmic Communication / Yan-Cheng Chang |
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions / Goichiro Hanaoka ; Hideki Imai ; Joern Mueller-Quade ; Anderson C.A. Nascimento ; Akira Otsuka ; Andreas Winter |
Trust and Secret Sharing |
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing / Gildas Avoine ; Serge Vaudenay |
NGSCB: A Trusted Open System / Marcus Peinado ; Yuqun Chen ; Paul England ; John Manferdelli |
Cryptanalysis (I) |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers / Jorge Nakahara ; Jr. ; Bart Preneel ; Joos Vandewalle |
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 / Yongsup Shin ; Jongsung Kim ; Guil Kim ; Seokhie Hong ; Sangjin Lee |
The Related-Key Rectangle Attack - Application to SHACAL-1 / Dowon Hong |
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 / Youngdai Ko ; Changhoon Lee |
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders / Michael J. Jacobson |
Cryptanalysis (II) |
Analysis of a Conference Scheme Under Active and Passive Attacks / Feng Bao |
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols / Zhiguo Wan ; Shuhong Wang |
Analysis and Improvement of Micali's Fair Contract Signing Protocol / Guilin Wang ; Jianying Zhou ; Huafei Zhu |
Digital Signatures (I) |
Digital Signature Schemes With Domain Parameters |
Generic Construction of Certificateless Signature / Dae Hyun Yum |
Cryptosystems (I) |
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model / Wonil Lee ; Mridul Nandi ; Palash Sarkar ; Donghoon Chang ; Kouichi Sakurai |
How to Re-use Round Function in Super-Pseudorandom Permutation / Tetsu Iwata ; Kaoru Kurosawa |
How to Remove MAC from DHIES / Toshihiko Matsuo |
Symmetric Key Authentication Services Revisited / Bruno Crispo ; Bogdan C. Popescu ; Andrew S. Tanenbaum |
Fast Computation |
Improvements to the Point Halving Algorithm / Brian King ; Ben Rubin |
Theoretical Analysis of XL over Small Fields / Bo-Yin Yang ; Jiun-Ming Chen |
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks / Chae Hoon Lim |
Mobile Agents Security |
A Mobile Agent System Providing Offer Privacy / Ming Yao ; Matt Henricksen ; Greg Maitland ; Ernest Foo ; Ed Dawson |
Digital Signatures (II) |
Identity-Based Strong Designated Verifier Signature Schemes / Willy Susilo ; Fangguo Zhang ; Yi Mu |
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong |
A Group Signature Scheme With Efficient Membership Revocation for Reasonable Groups / Toru Nakanishi ; Yuji Sugiyama |
Convertible Nominative Signatures / Zhenjie Huang ; Yumin Wang |
Protocols |
Protocols With Security Proofs for Mobile Applications / Yiu Shing Terry Tin ; Harikrishna Vasanta ; Colin Boyd ; Juan Manuel González Nieto |
Secure Bilinear Diffie-Hellman Bits / Steven D. Galbraith ; Herbie J. Hopkins ; Igor E. Shparlinski |
Weak Property of Malleability in NTRUSign / SungJun Min ; Go Yamamoto ; Kwangjo Kim |
Security Management |
Information Security Risk Assessment, Aggregation, and Mitigation / Arjen Lenstra ; Tim Voss |
Access Control and Authorisation |
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution / Chun Ruan ; Vijay Varadharajan |
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems / Xi-Bin Zhao ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun |
Cryptosystems (II) |
Unconditionally Secure Encryption Under Strong Attacks / Luke McAven ; Rei Safavi-Naini ; Moti Yung |
ManTiCore: Encryption With Joint Cipher-State Authentication / Erik Anderson ; Cheryl Beaver ; Timothy Draelos ; Richard Schroeppel ; Mark Torgerson |
Cryptanalysis (III) |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks / Dong-Guk Han ; Jongin Lim |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks / Katsuyuki Okeya ; Tsuyoshi Takagi ; Camille Vuillaume |
Fault Attacks on Signature Schemes / Christophe Giraud ; Erik W. Knudsen |
Author Index |
Broadcast Encryption and Traitor Tracing |
Multi-service Oriented Broadcast Encryption / Shaoquan Jiang ; Guang Gong |
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme / Tomoyuki Asano |
Linear Code Implies Public-Key Traitor Tracing With Revocation / Vu Dong Tô ; Reihaneh Safavi-Naini |
TTS Without Revocation Capability Secure Against CCA2 / Chong Hee Kim ; Yong Ho Hwang ; Pil Joong Lee |
Private Information Retrieval and Oblivious Transfer |