


default search action
ProvSec 2013: Melaka, Malaysia
- Willy Susilo, Reza Reyhanitabar:

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8209, Springer 2013, ISBN 978-3-642-41226-4
Invited Talk
- Serge Vaudenay:

On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. 1-20
Key Exchange Protocols
- Hai Huang:

Authenticated Key Exchange Protocols Based on Factoring Assumption. 21-37 - S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan:

Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. 38-58 - Cristian Ene, Clémentine Gritti, Yassine Lakhnech:

CIL Security Proof for a Password-Based Key Exchange. 59-85
Security Models
- Prabhanjan Ananth, Raghav Bhaskar:

Non Observability in the Random Oracle Model. 86-103 - Angsuman Das, Sabyasachi Dutta

, Avishek Adhikari:
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. 104-120 - Ioana Boureanu, Serge Vaudenay:

Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. 121-138 - Tsz Hon Yuen

, Cong Zhang, Sherman S. M. Chow
, Joseph K. Liu
:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. 139-153
Signature and Signcryption Schemes
- Weiwei Liu, Guomin Yang

, Yi Mu, Jiannan Wei:
k-time Proxy Signature: Formal Definition and Efficient Construction. 154-164 - Hui Cui

, Yi Mu, Man Ho Au
:
Anonymous Signcryption against Linear Related-Key Attacks. 165-183
Authenticated Encryption
- Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:

Improved Authenticity Bound of EAX, and Refinements. 184-201 - Kazumaro Aoki, Kan Yasuda:

The Security of the OCB Mode of Operation without the SPRP Assumption. 202-220 - Kazuhiko Minematsu:

A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. 221-238
Theory
- Xianhui Lu, Bao Li, Yamin Liu:

How to Remove the Exponent GCD in HK09. 239-248 - Nirattaya Khamsemanan, William E. Skeith III:

Translation-Randomizable Distributions via Random Walks. 249-270
Public Key Encryption
- Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei:

RKA Secure PKE Based on the DDH and HR Assumptions. 271-287 - Y. Sreenivasa Rao

, Ratna Dutta:
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. 288-308 - Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka:

Factoring-Based Proxy Re-Encryption Schemes. 309-329 - Hui Guo, Zhenfeng Zhang, Jiang Zhang

, Cheng Chen:
Towards a Secure Certificateless Proxy Re-Encryption Scheme. 330-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














