Papers to present
Karame, Androulaki, Capkun: “Two Bitcoins at the Price of One? Double-spending attacks on fast payments in Bitcoin” claimed
- Burmester, Desmedt: “A Secure and Efficient Conference Key Distribution System”
Sarkar, Fitzgerald: “Attacks on SSL. A comprehensive study of BEAST, CRIME, TIME, BREACH, LUCKY 13 & RC4 biases” claimed
- BSI: “Advanced Security Mechanisms for Machine-Readable Travel Documents – Part 2”
- Bordes: “BitLocker”
Fluhrer, Matin, Shamir: “Weaknesses in the Key Scheduling Algorithm of RC4” claimed
Montalvo, Defrance, Lefebvre, Le Scouarnec, Pérez: “Système de stockage-en-ligne avec confidentialité des données personnelles” claimed
Marechal: “État de l’art sur le cassage de mots de passe” claimed
Shi, Chan, Stefanov, Li: “Oblivious RAM with O((log N)3) Worse-Case Cost” claimed
- Curtmola, Garay, Kamara, Ostrovsky: “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions”
- Dodis, Pointcheval, Ruhault, Vergnaud, Wichs: “Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not robust”
- Bellare, Paterson, Rogaway: “Security of Symmetric Encryption against Mass Surveillance”