{"title":"Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes","authors":"D. Boneh, Sam Kim, V. Nikolaenko","doi":"10.1007/978-3-319-61204-1_23","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_23","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. A. Melchor, Martin R. Albrecht, Thomas Ricosset
{"title":"Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography","authors":"C. A. Melchor, Martin R. Albrecht, Thomas Ricosset","doi":"10.1007/978-3-319-61204-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_1","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122499412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are You Lying: Validating the Time-Location of Outdoor Images","authors":"Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu","doi":"10.1007/978-3-319-61204-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
{"title":"A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers","authors":"Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma","doi":"10.1007/978-3-319-61204-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_21","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"288 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis","authors":"S. Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low","doi":"10.1007/978-3-319-61204-1_26","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_26","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marco Cianfriglia, Stefano Guarino, M. Bernaschi, F. Lombardi, M. Pedicini
{"title":"A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium","authors":"Marco Cianfriglia, Stefano Guarino, M. Bernaschi, F. Lombardi, M. Pedicini","doi":"10.1007/978-3-319-61204-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_10","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks","authors":"Bruce Berg, Tyler Kaczmarek, A. Kobsa, G. Tsudik","doi":"10.1007/978-3-319-61204-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_7","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks","authors":"Daniel Demmler, Marco Holz, T. Schneider","doi":"10.1007/978-3-319-61204-1_30","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_30","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}