Public Key Encryption |
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud |
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing |
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters |
Digital Signature |
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee |
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder |
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering |
Block Ciphers and Hash Functions |
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li |
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert |
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang |
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan |
Side-Channel Attacks |
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog |
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert |
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater |
Zero Knowledge and Multi-party Protocols |
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert |
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel |
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen |
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu |
Key Management |
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin |
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao |
Authentication and Identification |
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang |
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang |
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay |
Privacy and Anonymity |
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik |
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas |
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang |
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion |
RFID Security and Privacy |
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li |
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann |
Internet Security |
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu |
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu |
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding |
Author Index |
Public Key Encryption |
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud |
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing |