default search action
9. SCN 2014: Amalfi, Italy
- Michel Abdalla, Roberto De Prisco:
Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8642, Springer 2014, ISBN 978-3-319-10878-0
Key Exchange
- Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz:
Universally Composable Non-Interactive Key Exchange. 1-20 - David Pointcheval, Olivier Sanders:
Forward Secure Non-Interactive Key Exchange. 21-39 - Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis:
Secure Key Exchange and Sessions without Credentials. 40-56
Multilinear Maps and Obfuscation
- Omkant Pandey, Kim Ramchen, Brent Waters:
Relaxed Two-to-One Recoding Schemes. 57-76 - Antonio Marcedone, Claudio Orlandi:
Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). 77-90
Invited Talk I
- Sanjam Garg:
Program Obfuscation via Multilinear Maps. 91-94
Pseudorandom Function Extensions
- Georg Fuchsbauer:
Constrained Verifiable Random Functions. 95-114 - Yu Chen, Zongyang Zhang:
Publicly Evaluable Pseudorandom Functions and Their Applications. 115-134
Secure Computation - Foundations and Algorithms
- Nikolaos Makriyannis:
On the Classification of Finite Boolean Functions up to Fairness. 135-154 - Joshua Lampkins, Rafail Ostrovsky:
Communication-Efficient MPC for General Adversary Structures. 155-174 - Carsten Baum, Ivan Damgård, Claudio Orlandi:
Publicly Auditable Secure Multi-Party Computation. 175-196 - Ashish Choudhury, Arpita Patra, Nigel P. Smart:
Reducing the Overhead of MPC over a Large Population. 197-217
Network Security
- Daniel V. Bailey, Markus Dürmuth, Christof Paar:
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. 218-235 - Paul Giura, Vladimir Kolesnikov, Aris Tentes, Yevgeniy Vahlis:
Efficient Network-Based Enforcement of Data Access Rights. 236-254 - Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis:
EyeDecrypt - Private Interactions in Plain Sight. 255-276
Functional Encryption
- Jie Chen, Hoeteck Wee:
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. 277-297 - Katsuyuki Takashima:
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption. 298-317
Invited Talk II
- Hoeteck Wee:
Functional Encryption and Its Impact on Cryptography. 318-323
Cryptanalysis
- Yu Sasaki, Lei Wang:
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. 324-339 - Yusuke Naito, Kazuo Ohta:
Improved Indifferentiable Security Analysis of PHOTON. 340-357
Secure Computation - Implementation
- Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen:
Faster Maliciously Secure Two-Party Computation Using the GPU. 358-379 - Jason Perry, Debayan Gupta, Joan Feigenbaum, Rebecca N. Wright:
Systematizing Secure Computation for Research and Decision Support. 380-397 - Ivan Damgård, Rasmus Lauritsen, Tomas Toft:
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation. 398-415
Zero Knowledge
- Helger Lipmaa:
Efficient NIZK Arguments via Parallel Verification of Benes Networks. 416-434 - Abhishek Jain, Omkant Pandey:
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. 435-454 - Muthuramakrishnan Venkitasubramaniam:
On Adaptively Secure Protocols. 455-475
Message Authentication
- Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. 476-493 - Yevgeniy Dodis, Dario Fiore:
Interactive Encryption and Message Authentication. 494-513
Invited Talk III
- Dario Catalano:
Homomorphic Signatures and Message Authentication Codes. 514-519
Proofs of Space and Erasure
- Nikolaos P. Karvelas, Aggelos Kiayias:
Efficient Proofs of Secure Erasure. 520-537 - Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space Is of the Essence. 538-557
Public-Key Encryption
- Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. 558-577 - Rafail Ostrovsky, Vanishree Rao, Ivan Visconti:
On Selective-Opening Attacks against Encryption Schemes. 578-597 - David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung:
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption. 598-607
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.