Skip to main content
  • Conference proceedings
  • © 2013

Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7954)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Cloud Cryptography

    1. Transparent, Distributed, and Replicated Dynamic Provable Data Possession

      • Mohammad Etemad, Alptekin Küpçü
      Pages 1-18
    2. Client-Controlled Cryptography-as-a-Service in the Cloud

      • Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
      Pages 19-36
    3. CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

      • Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
      Pages 37-52
    4. Computing on Authenticated Data for Adjustable Predicates

      • Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
      Pages 53-68
  3. Secure Computation

    1. Towards Efficient Private Distributed Computation on Unbounded Input Streams

      • Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
      Pages 69-83
    2. From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting

      • Sven Laur, Riivo Talviste, Jan Willemson
      Pages 84-101
    3. Private Database Queries Using Somewhat Homomorphic Encryption

      • Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
      Pages 102-118
  4. Hash Function and Block Cipher

    1. BLAKE2: Simpler, Smaller, Fast as MD5

      • Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
      Pages 119-135
  5. Signature

    1. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles

      • Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
      Pages 186-201
    2. Sequential Aggregate Signatures Made Shorter

      • Kwangsu Lee, Dong Hoon Lee, Moti Yung
      Pages 202-217
  6. Group-Oriented Cryptography

    1. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE

      • Rikke Bendlin, Sara Krehbiel, Chris Peikert
      Pages 218-236
    2. Toward Practical Group Encryption

      • Laila El Aimani, Marc Joye
      Pages 237-252
  7. System Attack I

    1. Experimental Analysis of Attacks on Next Generation Air Traffic Communication

      • Matthias Schäfer, Vincent Lenders, Ivan Martinovic
      Pages 253-271
    2. Launching Generic Attacks on iOS with Approved Third-Party Applications

      • Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao et al.
      Pages 272-289

Other Volumes

  1. Applied Cryptography and Network Security

About this book

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Editors and Affiliations

  • University of Calgary, Canada

    Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access