


default search action
17th ACNS 2019: Bogota, Colombia
- Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung:

Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11464, Springer 2019, ISBN 978-3-030-21567-5
Integrity and Cryptanalysis
- Sandro Coretti, Antonio Faonio

, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-malleable Codes. 3-23 - Jens Müller, Marcus Brinkmann

, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption. 24-42 - Subhadeep Banik

, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha
, Yu Sasaki:
Cryptanalysis of ForkAES. 43-63
Digital Signature and MAC
- Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad

, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. 67-88 - Daniel Gardham

, Mark Manulis
:
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length. 89-109 - Xingye Lu

, Man Ho Au
, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. 110-130 - Alexander Moch, Eik List:

Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. 131-151
Software and Systems Security
- Xiaoyang Cheng, Yan Lin, Debin Gao

, Chunfu Jia:
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. 155-174 - Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas

, Nils Ole Tippenhauer:
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems. 175-195 - John Henry Castellanos

, Jianying Zhou
:
A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. 196-216 - Briland Hitaj

, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz
:
PassGAN: A Deep Learning Approach for Password Guessing. 217-237
Blockchain and Cryptocurrency
- Sang-Yoon Chang, Younghee Park, Simeon Wuthier

, Chang-Wu Chen:
Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. 241-258 - Karim Eldefrawy, Ashish Gehani, Alexandre Matton:

Longitudinal Analysis of Misuse of Bitcoin. 259-278
Post Quantum Cryptography
- Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe:

Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates. 281-301 - Zhengzhong Jin, Yunlei Zhao:

Generic and Practical Key Establishment from Lattice. 302-322 - Jintai Ding

, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. 323-343 - Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque

:
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. 344-362 - Xiong Fan, Feng-Hao Liu:

Proxy Re-Encryption and Re-Signatures from Lattices. 363-382
Public Key and Commitment
- Behzad Abdolmaleki, Karim Baghery

, Helger Lipmaa, Janno Siim
, Michal Zajac:
DL-Extractable UC-Commitment Schemes. 385-405 - Jongkil Kim

, Willy Susilo
, Fuchun Guo
, Joonsang Baek
, Nan Li
:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. 406-425 - Edouard Dufour Sans, David Pointcheval:

Unbounded Inner-Product Functional Encryption with Succinct Keys. 426-441 - Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:

Password-Authenticated Public-Key Encryption. 442-462
Theory of Cryptographic Implementations
- Giuseppe Ateniese, Danilo Francati

, Bernardo Magri
, Daniele Venturi:
Public Immunization Against Complete Subversion Without Random Oracles. 465-485 - Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. 486-506
Privacy Preserving Techniques
- Abdelrahaman Aly

, Nigel P. Smart
:
Benchmarking Privacy Preserving Scientific Operations. 509-529 - Aner Ben-Efraim, Michael Nielsen, Eran Omri

:
Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing. 530-549 - Jia Liu

, Mark Manulis
:
pRate: Anonymous Star Rating with Rating Secrecy. 550-570 - Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi:

Masking Fuzzy-Searchable Public Databases. 571-591 - Flávio Bergamaschi

, Shai Halevi, Tzipora T. Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. 592-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














