Applied Cryptography and Network Security

12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

  • Ioana Boureanu
  • Philippe Owesarski
  • Serge Vaudenay
Conference proceedings ACNS 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8479)

Table of contents

  1. Front Matter
  2. Key Exchange

    1. Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk
      Pages 1-18
    2. M. Kreuzer, A. D. Myasnikov, A. Ushakov
      Pages 37-43
  3. Primitive Construction

    1. Kevin Lewi, Hart Montgomery, Ananth Raghunathan
      Pages 44-61
    2. Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 62-79
    3. Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
      Pages 80-96
    4. Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 116-133
  4. Attacks (Public-Key Cryptography)

    1. Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie
      Pages 134-150
    2. Taechan Kim, Mehdi Tibouchi
      Pages 163-180
  5. Hashing

    1. Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
      Pages 181-198
    2. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 217-234
    3. Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
      Pages 235-252
  6. Cryptanalysis & Attacks (Symmetric Cryptography)

  7. Network Security

    1. Andriy Stetsko, Tobiáš Smolka, Vashek Matyáš, Martin Stehlík
      Pages 343-360
    2. Zhe Liu, Erich Wenger, Johann Großschädl
      Pages 361-379
    3. Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel
      Pages 380-400
    4. Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin
      Pages 401-418
  8. Signatures

    1. Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai
      Pages 419-437
    2. Henrich C. Pöhls, Kai Samelin
      Pages 457-475
    3. Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
      Pages 476-493
  9. System Security

    1. Brett Cooley, Haining Wang, Angelos Stavrou
      Pages 494-512
    2. Xinran Wang, Tadayoshi Kohno, Bob Blakley
      Pages 513-530
    3. Haya Shulman, Michael Waidner
      Pages 531-548
  10. Secure Computation

    1. Sébastien Canard, Julien Devigne, Olivier Sanders
      Pages 549-565
    2. Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
      Pages 566-584
  11. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.


RSA authenticated key exchange cryptanalysis and other attacks cryptographic primitives cryptography hash functions intrusion detection key management mathematical foundations of cryptography network security public key techniques secure computation security services signatures software and application security symmetric cryptography systems security

Editors and affiliations

  • Ioana Boureanu
    • 1
  • Philippe Owesarski
    • 2
  • Serge Vaudenay
    • 3
  1. 1.Akamai EMEAAddlestoneUK
  2. 2.LAAS-CNRS, SARAToulouseFrance
  3. 3.IC LASECEcole Polytechnique Fédérale de Lausanne (EPFL)LausanneSwitzerland

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-07535-8
  • Online ISBN 978-3-319-07536-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment