|
Authentication and Key Establishment |
|
|
|
On the Security of the Algebraic Eraser Tag Authentication Protocol |
|
|
3 | (15) |
|
|
|
A Cryptographic Analysis of UMTS/LTE AKA |
|
|
18 | (18) |
|
|
|
|
|
|
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token |
|
|
36 | (22) |
|
|
|
|
Two More Efficient Variants of the J-PAKE Protocol |
|
|
58 | (19) |
|
|
|
|
Hash-Based TPM Signatures for the Quantum World |
|
|
77 | (20) |
|
|
|
|
|
Signatures with Advanced Properties |
|
|
|
Fuzzy Signatures: Relaxing Requirements and a New Construction |
|
|
97 | (20) |
|
|
|
|
|
Foundations of Fully Dynamic Group Signatures |
|
|
117 | (20) |
|
|
|
|
|
|
A Lattice-Based Group Signature Scheme with Message-Dependent Opening |
|
|
137 | (19) |
|
|
|
|
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security |
|
|
156 | (19) |
|
|
|
|
Legally Fair Contract Signing Without Keystones |
|
|
175 | (18) |
|
|
|
|
|
|
DoS Attacks and Network Anomaly Detection |
|
|
|
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms |
|
|
193 | (19) |
|
|
|
|
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering |
|
|
212 | (19) |
|
|
|
|
|
Deterministic and Functional Encryption |
|
|
|
More Efficient Constructions for Inner-Product Encryption |
|
|
231 | (18) |
|
|
Attribute Based Encryption with Direct Efficiency Tradeoff |
|
|
249 | (18) |
|
|
|
|
|
|
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions |
|
|
267 | (18) |
|
|
|
Offline Witness Encryption |
|
|
285 | (19) |
|
|
|
|
Deterministic Public-Key Encryption Under Continual Leakage |
|
|
304 | (23) |
|
|
|
|
|
Computing on Encrypted Data |
|
|
|
Better Preprocessing for Secure Multiparty Computation |
|
|
327 | (19) |
|
|
|
|
|
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation |
|
|
346 | (21) |
|
|
|
|
Verifiable Multi-party Computation with Perfectly Private Audit Trail |
|
|
367 | (19) |
|
|
|
Practical Fault-Tolerant Data Aggregation |
|
|
386 | (19) |
|
|
|
|
Accelerating Homomorphic Computations on Rational Numbers |
|
|
405 | (22) |
|
|
|
Non-Interactive Proofs and PRFs |
|
|
|
New Techniques for Non-interactive Shuffle and Range Arguments |
|
|
427 | (18) |
|
|
|
Constrained PRFs for Unbounded Inputs with Short Keys |
|
|
445 | (22) |
|
|
|
|
|
Wide Trail Design Strategy for Binary MixColumns: Enhancing Lower Bound of Number of Active S-boxes |
|
|
467 | (18) |
|
|
|
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey |
|
|
485 | (15) |
|
|
|
|
Square Attack on 7-Round Kiasu-BC |
|
|
500 | (18) |
|
|
|
|
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants |
|
|
518 | (19) |
|
|
|
|
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice |
|
|
537 | (24) |
|
|
|
|
|
|
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing |
|
|
561 | (19) |
|
|
|
|
Parallel Implementation of BDD Enumeration for LWE |
|
|
580 | (12) |
|
|
|
|
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff |
|
|
592 | (19) |
|
|
|
|
|
|
|
|
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery |
|
|
611 | (18) |
|
|
|
|
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones |
|
|
629 | (19) |
|
|
|
|
|
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case |
|
|
648 | (19) |
|
|
|
|
Author Index |
|
667 | |