|
Signature and Key Management |
|
|
|
One-Round Strong Oblivious Signature-Based Envelope |
|
|
3 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Proxy Signature with Revocation |
|
|
21 | (16) |
|
|
|
|
|
|
|
|
|
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures |
|
|
37 | (20) |
|
|
|
|
|
|
|
|
|
|
|
Public Key and Identity-Based Encryption Content-Based Encryption |
|
|
57 | (16) |
|
|
|
|
|
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry |
|
|
73 | (14) |
|
|
|
|
|
|
|
|
|
Identity-Based Group Encryption |
|
|
87 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Edit Distance Based Encryption and Its Application |
|
|
103 | (17) |
|
|
|
|
|
|
|
|
|
Proxy Re-encryption with Delegatable Verifiability |
|
|
120 | (14) |
|
|
|
|
|
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions |
|
|
134 | (19) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage |
|
|
153 | (17) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Public Key Encryption with Authorized Keyword Search |
|
|
170 | (17) |
|
|
|
|
|
|
|
|
|
Linear Encryption with Keyword Search |
|
|
187 | (20) |
|
|
|
|
|
|
|
|
|
|
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security |
|
|
207 | (16) |
|
|
|
|
|
|
|
|
|
|
|
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing |
|
|
223 | (20) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs |
|
|
243 | (15) |
|
|
|
|
|
A New Attack on Three Variants of the RSA Cryptosystem |
|
|
258 | (11) |
|
|
|
|
|
|
|
|
|
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information |
|
|
269 | (16) |
|
|
|
|
|
|
|
Deterministic Encoding into Twisted Edwards Curves |
|
|
285 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ |
|
|
301 | (16) |
|
|
|
|
|
|
|
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch |
|
|
317 | (16) |
|
|
|
|
|
|
|
|
|
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework |
|
|
333 | (14) |
|
|
|
|
|
|
|
|
|
|
|
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) |
|
|
347 | (16) |
|
|
|
Impossible Differential Cryptanalysis of 14-Round Camellia-192 |
|
|
363 | (16) |
|
|
|
|
|
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA |
|
|
379 | (16) |
|
|
|
|
|
|
|
On the Security of the LAC Authenticated Encryption Algorithm |
|
|
395 | (14) |
|
|
|
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques |
|
|
409 | (18) |
|
|
|
|
|
|
|
Short Papers-Public Key and Identity-Based Encryption Reducing the Key Size of the SRP Encryption Scheme |
|
|
427 | (10) |
|
|
|
|
|
|
|
Short Papers-Biometric Security |
|
|
|
Biometric Access Control with High Dimensional Facial Features |
|
|
437 | (9) |
|
|
|
|
|
|
|
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes |
|
|
446 | (11) |
|
|
|
|
|
|
|
Short Papers-Digital Forensics |
|
|
|
Interest Profiling for Security Monitoring and Forensic Investigation |
|
|
457 | (10) |
|
|
|
|
|
|
|
Short Papers-National Security Infrastructure |
|
|
|
Pseudonymous Signature on eIDAS Token -- Implementation Based Privacy Threats |
|
|
467 | (14) |
|
|
|
|
|
|
|
Short Papers-Mobile Security |
|
|
|
A Feasible No-Root Approach on Android |
|
|
481 | (12) |
|
|
|
|
|
|
|
Short Papers-Network Security |
|
|
|
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning |
|
|
493 | (12) |
|
|
|
|
|
|
|
Short Papers-Pseudo Random/One-way Function |
|
|
|
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems |
|
|
505 | (10) |
|
|
|
|
|
|
| Author Index |
|
515 | |