Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings /
Saved in:
Meeting name: | International Conference on Cryptology and Network Security (12th : 2013 : Parati, Brazil) |
---|---|
Imprint: | Cham : Springer, 2013. |
Description: | 1 online resource (xviii, 349 pages) : illustrations. |
Language: | English |
Series: | Lecture Notes in Computer Science, 0302-9743 ; 8257 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 8257. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11081951 |
Table of Contents:
- Cryptanalysis I. Differential Attacks on Generalized Feistel Schemes / Valérie Nachef, Emmanuel Volte and Jacques Patarin
- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation / Bo Zhu, Yin Tan and Guang Gong
- Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? / Si Gao, Hua Chen and Limin Fan
- Zero-Knowledge Protocols. Zero Knowledge Proofs from Ring-LWE / Xiang Xie, Rui Xue and Minqian Wang
- Zero Knowledge with Rubik's Cubes and Non-abelian Groups / Emmanuel Volte, Jacques Patarin and Valérie Nachef
- Efficient Modular NIZK Arguments from Shift and Product / Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang
- Distributed Protocols. Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model / Yong Li and Zheng Yang
- Achieving Correctness in Fair Rational Secret Sharing / Sourya Joyee De and Asim K. Pal
- Network Security and Applications. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis / Nizar Kheir and Chirine Wolley
- Resource Access Control in the Facebook Model / Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias
- Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture / Babins Shrestha, Nitesh Saxena and Justin Harrison
- Advanced Cryptographic Primitives. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition / Mihir Bellare and Adam O'Neill
- Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions / Haiyang Xue [and others]
- Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions / Veronika Kuchta and Mark Manulis
- Cryptanalysis II. A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher / Tomer Ashur and Orr Dunkelman
- Truncated Differential Analysis of Reduced-Round LBlock / Sareh Emami [and others]
- Verifiable Computation. How to Update Documents Verifiably in Searchable Symmetric Encryption / Kaoru Kurosawa and Yasuhiro Ohtaki
- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps / Liang Feng Zhang and Reihaneh Safavi-Naini.