Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_21
T. Frederiksen, Thomas P. Jakobsen, J. Nielsen
{"title":"Faster Maliciously Secure Two-Party Computation Using the GPU","authors":"T. Frederiksen, Thomas P. Jakobsen, J. Nielsen","doi":"10.1007/978-3-319-10879-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_21","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_11
Carsten Baum, I. Damgård, Claudio Orlandi
{"title":"Publicly Auditable Secure Multi-Party Computation","authors":"Carsten Baum, I. Damgård, Claudio Orlandi","doi":"10.1007/978-3-319-10879-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_11","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_16
Jie Chen, H. Wee
{"title":"Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula","authors":"Jie Chen, H. Wee","doi":"10.1007/978-3-319-10879-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_16","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133378659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_29
D. Catalano
{"title":"Homomorphic Signatures and Message Authentication Codes","authors":"D. Catalano","doi":"10.1007/978-3-319-10879-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_29","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_22
Jason Perry, Debayan Gupta, J. Feigenbaum, R. Wright
{"title":"Systematizing Secure Computation for Research and Decision Support","authors":"Jason Perry, Debayan Gupta, J. Feigenbaum, R. Wright","doi":"10.1007/978-3-319-10879-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_19
Yu Sasaki, Lei Wang
{"title":"Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks","authors":"Yu Sasaki, Lei Wang","doi":"10.1007/978-3-319-10879-7_19","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_19","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_20
Yusuke Naito, K. Ohta
{"title":"Improved Indifferentiable Security Analysis of PHOTON","authors":"Yusuke Naito, K. Ohta","doi":"10.1007/978-3-319-10879-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_20","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_24
H. Lipmaa
{"title":"Efficient NIZK Arguments via Parallel Verification of Benes Networks","authors":"H. Lipmaa","doi":"10.1007/978-3-319-10879-7_24","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_24","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132589234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_14
P. Giura, V. Kolesnikov, Aris Tentes, Yevgeniy Vahlis
{"title":"Efficient Network-Based Enforcement of Data Access Rights","authors":"P. Giura, V. Kolesnikov, Aris Tentes, Yevgeniy Vahlis","doi":"10.1007/978-3-319-10879-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_14","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121873771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}