default search action
19th ACNS 2021: Kamakura, Japan - Part II
- Kazue Sako, Nils Ole Tippenhauer:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12727, Springer 2021, ISBN 978-3-030-78374-7
Analysis of Applied Systems
- Shangcheng Shi, Xianbo Wang, Wing Cheong Lau:
Breaking and Fixing Third-Party Payment Service for Mobile Apps. 3-26 - Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo Liu, Limin Sun:
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. 27-48 - Andy Russon:
Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library. 49-75
Secure Computations
- Florine W. Dekker, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Probabilistic Range Validation. 79-98 - Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame:
LLVM-Based Circuit Compilation for Practical Secure Computation. 99-121 - Mark Abspoel, Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. 122-152
Cryptanalysis
- Ruben Groot Roessink, Andreas Peter, Florian Hahn:
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements. 155-183 - Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme:
Efficient Methods to Search for Best Differential Characteristics on SKINNY. 184-207 - Sonia Bogos, Dario Korolija, Thomas Locher, Serge Vaudenay:
Towards Efficient LPN-Based Symmetric Encryption. 208-230
System Security
- Rogério V. M. Rocha, Pedro Paulo Libório, Harsh Kupwade Patil, Diego F. Aranha:
A Differentially Private Hybrid Approach to Traffic Monitoring. 233-256 - Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:
Proactive Detection of Phishing Kit Traffic. 257-286 - Yuede Ji, Lei Cui, H. Howie Huang:
Vestige: Identifying Binary Code Provenance for Vulnerability Detection. 287-310 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Auditability and Accountability in Distributed Payment Systems. 311-337 - Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:
Defending Web Servers Against Flash Crowd Attacks. 338-361
Cryptography and Its Applications
- Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang:
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-quantum Signatures. 365-395 - Thales Bandiera Paiva, Routo Terada:
Cryptanalysis of the Binary Permuted Kernel Problem. 396-423 - Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou, Sang-Yoon Chang:
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms. 424-447 - Hannah Davis, Felix Günther:
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols. 448-479 - David Cash, Ruth Ng, Adam Rivkin:
Improved Structured Encryption for SQL Databases via Hybrid Indexing. 480-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.