


default search action
19th ACNS 2021: Kamakura, Japan - Part II
- Kazue Sako, Nils Ole Tippenhauer

:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12727, Springer 2021, ISBN 978-3-030-78374-7
Analysis of Applied Systems
- Shangcheng Shi

, Xianbo Wang
, Wing Cheong Lau:
Breaking and Fixing Third-Party Payment Service for Mobile Apps. 3-26 - Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo Liu, Limin Sun:

DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. 27-48 - Andy Russon:

Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library. 49-75
Secure Computations
- Florine W. Dekker

, Zekeriya Erkin
:
Privacy-Preserving Data Aggregation with Probabilistic Range Validation. 79-98 - Tim Heldmann, Thomas Schneider

, Oleksandr Tkachenko, Christian Weinert
, Hossein Yalame:
LLVM-Based Circuit Compilation for Practical Secure Computation. 99-121 - Mark Abspoel, Anders P. K. Dalskov

, Daniel Escudero, Ariel Nof:
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. 122-152
Cryptanalysis
- Ruben Groot Roessink, Andreas Peter, Florian Hahn

:
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements. 155-183 - Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme

:
Efficient Methods to Search for Best Differential Characteristics on SKINNY. 184-207 - Sonia Bogos, Dario Korolija, Thomas Locher, Serge Vaudenay:

Towards Efficient LPN-Based Symmetric Encryption. 208-230
System Security
- Rogério V. M. Rocha

, Pedro Paulo Libório
, Harsh Kupwade Patil
, Diego F. Aranha
:
A Differentially Private Hybrid Approach to Traffic Monitoring. 233-256 - Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:

Proactive Detection of Phishing Kit Traffic. 257-286 - Yuede Ji, Lei Cui, H. Howie Huang

:
Vestige: Identifying Binary Code Provenance for Vulnerability Detection. 287-310 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:

SoK: Auditability and Accountability in Distributed Payment Systems. 311-337 - Rajat Tandon

, Abhinav Palia
, Jaydeep Ramani
, Brandon Paulsen
, Genevieve Bartlett
, Jelena Mirkovic
:
Defending Web Servers Against Flash Crowd Attacks. 338-361
Cryptography and Its Applications
- Yaron Gvili, Julie Ha, Sarah Scheffler

, Mayank Varia, Ziling Yang, Xinyuan Zhang:
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-quantum Signatures. 365-395 - Thales Bandiera Paiva

, Routo Terada
:
Cryptanalysis of the Binary Permuted Kernel Problem. 396-423 - Manohar Raavi

, Simeon Wuthier
, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou, Sang-Yoon Chang:
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms. 424-447 - Hannah Davis

, Felix Günther:
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols. 448-479 - David Cash, Ruth Ng, Adam Rivkin:

Improved Structured Encryption for SQL Databases via Hybrid Indexing. 480-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














