


default search action
18th ACNS 2020: Rome, Italy - Part I
- Mauro Conti

, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7
Cryptographic Protocols
- Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:

Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities. 3-23 - Anand Aiyer, Xiao Liang

, Nilu Nalini, Omkant Pandey:
Random Walks and Concurrent Zero-Knowledge. 24-44 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei

, Vladimir Shpilrain:
Secure and Efficient Delegation of Elliptic-Curve Pairing. 45-66
Cryptographic Primitives
- Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai:

Tweaking Key-Alternating Feistel Block Ciphers. 69-88 - Shoichi Hirose

, Yu Sasaki, Hirotaka Yoshida:
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode. 89-109 - Hilder Vitor Lima Pereira:

Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic. 110-129 - Huy Quoc Le

, Dung Hoang Duong, Willy Susilo
, Josef Pieprzyk
:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. 130-149
Attacks on Cryptographic Primitives
- Liliya Kraleva

, Tomer Ashur
, Vincent Rijmen
:
Rotational Cryptanalysis on MAC Algorithm Chaskey. 153-168 - Reza Azarderakhsh, David Jao

, Brian Koziel, Jason T. LeGrow
, Vladimir Soukharev, Oleg Taraskin:
How Not to Create an Isogeny-Based PAKE. 169-186 - Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:

ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? 187-207 - Loïs Huguenin-Dumittan, Serge Vaudenay:

Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes. 208-227
Encryption and Signature
- Peter Chvojka, Tibor Jager, Saqib A. Kakvi:

Offline Witness Encryption with Semi-adaptive Security. 231-250 - Intae Kim

, Seong Oun Hwang, Willy Susilo
, Joonsang Baek
, Jongkil Kim:
Efficient Anonymous Multi-group Broadcast Encryption. 251-270 - Antonio Faonio

, Dario Fiore:
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption. 271-291 - Susan Hohenberger, Brent Waters:

New Methods and Abstractions for RSA-Based Forward Secure Signatures. 292-312
Blockchain and Cryptocurrency
- Dominic Deuber

, Nico Döttling, Bernardo Magri
, Giulio Malavolta
, Sri Aravinda Krishnan Thyagarajan
:
Minting Mechanism for Proof of Stake Blockchains. 315-334 - Aydin Abadi

, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -. 335-354
Secure Multi-party Computation
- Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida

:
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks. 357-376 - Marina Blanton, Ah Reum Kang, Chen Yuan:

Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority. 377-397 - Niek J. Bouman, Niels de Vreede:

A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals. 398-417
Post-Quantum Cryptography
- Bin Wang, Xiaozhuo Gu, Yingshan Yang:

Saber on ESP32. 421-440 - Erdem Alkim

, Paulo S. L. M. Barreto, Nina Bindel
, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. 441-460 - Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider

, Patrick Struck
:
Secure Two-Party Computation in a Quantum World. 461-480 - Aaron Hutchinson, Jason T. LeGrow

, Brian Koziel, Reza Azarderakhsh:
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors. 481-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














