{"title":"More Efficient Construction of Bounded KDM Secure Encryption","authors":"K. Kurosawa, Rie Habuka","doi":"10.1007/978-3-319-61204-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_18","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. H. Castellanos, D. Antonioli, Nils Ole Tippenhauer, Martín Ochoa
{"title":"Legacy-Compliant Data Authentication for Industrial Control System Traffic","authors":"J. H. Castellanos, D. Antonioli, Nils Ole Tippenhauer, Martín Ochoa","doi":"10.1007/978-3-319-61204-1_33","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_33","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stanislaw Jarecki, A. Kiayias, H. Krawczyk, Jiayu Xu
{"title":"TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF","authors":"Stanislaw Jarecki, A. Kiayias, H. Krawczyk, Jiayu Xu","doi":"10.1007/978-3-319-61204-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_3","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122315511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forward-Secure Searchable Encryption on Labeled Bipartite Graphs","authors":"Russell W. F. Lai, Sherman S. M. Chow","doi":"10.1007/978-3-319-61204-1_24","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_24","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134607729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)","authors":"D. Bernhard, Ngoc Khanh Nguyen, B. Warinschi","doi":"10.1007/978-3-319-61204-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_17","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115183263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounds in Various Generalized Settings of the Discrete Logarithm Problem","authors":"Jason H. M. Ying, N. Kunihiro","doi":"10.1007/978-3-319-61204-1_25","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_25","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129154142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols","authors":"Ronghai Yang, W. Lau, Shangcheng Shi","doi":"10.1007/978-3-319-61204-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_16","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133540157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Xu, S. Yeo, Kazuhide Fukushima, T. Takagi, Hwajung Seo, S. Kiyomoto, Matt Henricksen
{"title":"An Experimental Study of the BDD Approach for the Search LWE Problem","authors":"Rui Xu, S. Yeo, Kazuhide Fukushima, T. Takagi, Hwajung Seo, S. Kiyomoto, Matt Henricksen","doi":"10.1007/978-3-319-61204-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_13","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}