Applied Cryptography and Network Security

13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

  • Tal Malkin
  • Vladimir Kolesnikov
  • Allison Bishop Lewko
  • Michalis Polychronakis
Conference proceedings ACNS 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9092)

Also part of the Security and Cryptology book sub series (LNSC, volume 9092)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Secure Computation I: Primitives and New Models

    1. Front Matter
      Pages 1-1
    2. Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
      Pages 23-41
  3. Public Key Cryptographic Primitives

    1. Front Matter
      Pages 63-63
    2. Olivier Blazy, Céline Chevalier
      Pages 65-86
    3. Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
      Pages 87-104
    4. Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
      Pages 105-126
  4. Secure Computation II: Applications

    1. Front Matter
      Pages 147-147
    2. Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
      Pages 149-171
    3. Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
      Pages 172-191
    4. Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
      Pages 192-214
    5. Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
      Pages 215-239
  5. Anonymity and Related Applications

    1. Front Matter
      Pages 241-241
    2. Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
      Pages 243-262
    3. Satrajit Ghosh, Aniket Kate
      Pages 263-286
    4. Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 287-306
    5. Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
      Pages 307-327
  6. Cryptanalysis and Attacks (Symmetric Crypto)

    1. Front Matter
      Pages 329-329
    2. Yuval Yarom, Gefei Li, Damith C. Ranasinghe
      Pages 370-385
  7. Privacy and Policy Enforcement

    1. Front Matter
      Pages 387-387
    2. Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
      Pages 389-408
    3. Florian Kelbert, Alexander Pretschner
      Pages 409-430
    4. Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
      Pages 431-453
  8. Authentication via Eye Tracking and Proofs of Proximity

    1. Front Matter
      Pages 455-455
    2. Dachuan Liu, Bo Dong, Xing Gao, Haining Wang
      Pages 457-477
    3. Handan Kılınç, Serge Vaudenay
      Pages 478-494
  9. Malware Analysis and Side Channel Attacks

    1. Front Matter
      Pages 495-495
    2. Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao
      Pages 497-517
    3. Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
      Pages 538-556
  10. Side Channel Countermeasures and Tamper Resistance/PUFs

    1. Front Matter
      Pages 557-557
    2. Tobias Schneider, Amir Moradi, Tim Güneysu
      Pages 559-578
    3. Jonas Schneider, Dominique Schröder
      Pages 579-594
    4. Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
      Pages 595-615
  11. Leakage Resilience and Pseudorandomness

    1. Front Matter
      Pages 617-617
    2. Bart Mennink, Bart Preneel
      Pages 619-634
    3. Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
      Pages 635-654
    4. Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
      Pages 655-674
    5. Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
      Pages 675-695
  12. Back Matter
    Pages 697-698

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.


Applied Cryptography Network Security privacy anonymity outsourced computation digital currencies provably secure protocols impossibility results attacks industrial challenges case studies big data hardware security new paradigms non-traditional perspectives privacy metrics public key cryptography security security metrics symmetric key cryptography

Editors and affiliations

  • Tal Malkin
    • 1
  • Vladimir Kolesnikov
    • 2
  • Allison Bishop Lewko
    • 3
  • Michalis Polychronakis
    • 4
  1. 1.Columbia UniversityNew YorkUSA
  2. 2.Bell LabsMurray HillUSA
  3. 3.Columbia UniversityNew YorkUSA
  4. 4.Stony Brook UniversityStony BrookUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-28165-0
  • Online ISBN 978-3-319-28166-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment