


default search action
20th ACNS 2022: Rome, Italy
- Giuseppe Ateniese

, Daniele Venturi
:
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13269, Springer 2022, ISBN 978-3-031-09233-6
Encryption
- Shingo Sato, Keita Emura, Atsushi Takayasu:

Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. 3-23 - Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala:

A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. 24-44 - Liang Zhao

, Ze Chen, Liqun Chen
, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. 45-64
Attacks
- Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:

Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. 67-84 - Prakash Shrestha, Nitesh Saxena:

Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. 85-104 - Narmeen Shafqat

, Daniel J. Dubois
, David R. Choffnes
, Aaron Schulman
, Dinesh Bharadia
, Aanjhan Ranganathan
:
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes. 105-125 - Marco Dijkslag, Marc Damie

, Florian Hahn
, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. 126-146 - Zengrui Liu, Prakash Shrestha, Nitesh Saxena:

Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. 147-169 - Herson Esquivel-Vargas

, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. 170-192 - Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom:

RSA Key Recovery from Digit Equivalence Information. 193-211 - Florette Martinez:

Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators. 212-229 - Hosein Hadipour

, Maria Eichlseder
:
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges. 230-250
Cryptographic Protocols
- Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers

:
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip. 253-272 - Edward Eaton, Sajin Sasy, Ian Goldberg:

Improving the Privacy of Tor Onion Services. 273-292 - Loïc Ferreira:

Privacy-Preserving Authenticated Key Exchange for Constrained Devices. 293-312 - Alisa Pankova, Jan Willemson

:
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. 313-333
System Security
- Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya:

An Approach to Generate Realistic HTTP Parameters for Application Layer Deception. 337-355 - Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun:

IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. 356-375 - Johanna Ansohn McDougall

, Christian Burkert
, Daniel Demmler
, Monina Schwarz
, Vincent Hubbe, Hannes Federrath:
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests. 376-395
Cryptographic Primitives
- Ghada Arfaoui, Pierre-Alain Fouque

, Thibaut Jacques
, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. 399-418 - Tsz Hon Yuen

, Cong Zhang, Sherman S. M. Chow
:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. 419-439 - Cecilia Boschini

, Dario Fiore, Elena Pagnin:
Progressive and Efficient Verification for Digital Signatures. 440-458 - Daniel Gardham

, Mark Manulis
:
Revocable Hierarchical Attribute-Based Signatures from Lattices. 459-479 - Rajendra Kumar

, Khoa Nguyen
:
Covert Authentication from Lattices. 480-500 - S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu:

Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy. 501-520 - Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:

Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. 521-541 - Hamidreza Khoshakhlagh

:
(Commit-and-Prove) Predictable Arguments with Privacy. 542-561
MPC
- Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:

Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities. 565-584 - Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu

, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. 585-604 - Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura

:
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. 605-625 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee:

Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security. 626-642 - Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka:

Efficient Two-Party Exponentiation from Quotient Transfer. 643-662 - Thomas Attema

, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. 663-683 - Karim Eldefrawy, Julian Loss, Ben Terner:

How Byzantine is a Send Corruption? 684-704
Blockchain
- Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova:

Babel Fees via Limited Liabilities. 707-726 - Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh

:
FAST: Fair Auctions via Secret Transactions. 727-747 - Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:

Astrape: Anonymous Payment Channels with Boring Cryptography. 748-768
Block-Cyphers
- Joachim Vandersmissen, Adrián Ranea

, Bart Preneel:
A White-Box Speck Implementation Using Self-equivalence Encodings. 771-791 - Feifan Wang, Gaoli Wang:

Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64. 792-808 - Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:

Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. 809-829
Post-quantum Cryptography
- Ming-Shing Chen

, Tim Güneysu
, Markus Krausz
, Jan Philipp Thoma
:
Carry-Less to BIKE Faster. 833-852 - Amin Abdulrahman

, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
:
Faster Kyber and Dilithium on the Cortex-M4. 853-871 - Gustavo Banegas

, Koen Zandberg, Emmanuel Baccelli
, Adrian Herrmann, Benjamin Smith:
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices. 872-891 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:

Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. 892-912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














