


default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part I
- Christina Pöpper

, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14583, Springer 2024, ISBN 978-3-031-54769-0
Cryptographic Protocols
- Chris Brzuska, Christoph Egger

, Kirthivaasan Puniamurthy:
CryptoZoo: A Viewer for Reduction Proofs. 3-25 - Xavier Carpent, Seoyeon Hwang, Gene Tsudik:

Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols. 26-57 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:

A New Approach to Efficient and Secure Fixed-Point Computation. 58-87 - Pengfei Wang

, Xiangyu Su
, Mario Larangeira
, Keisuke Tanaka
:
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing. 88-118 - Kittiphop Phalakarn, Toru Nakamura:

Verification Protocol for Stable Matching from Conditional Disclosure of Secrets. 119-134 - Danilo Francati

, Daniele Venturi
:
Non-malleable Fuzzy Extractors. 135-155 - Chloé Cachet, Ariel Hamlin, Maryam Rezapour

, Benjamin Fuller:
Upgrading Fuzzy Extractors. 156-182 - Edoardo Liberati

, Alessandro Visintin
, Riccardo Lazzeretti
, Mauro Conti
, A. Selcuk Uluagac
:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. 183-210
Encrypted Data
- Mengyu Zhang, Long Wang, Xiaoping Zhang, Zhuotao Liu

, Yisong Wang, Han Bao:
Efficient Clustering on Encrypted Data. 213-236 - Keita Emura

:
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. 237-256 - Thi Van Thao Doan, Olivier Pereira, Thomas Peters:

Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections. 257-287 - Robin Berger

, Felix Dörre
, Alexander Koch
:
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption. 288-317 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. 318-347
Signatures
- Pascal Bemmann, Sebastian Berndt, Rongmao Chen:

Subversion-Resilient Signatures Without Random Oracles. 351-375 - Nabil Alkeilani Alkadri

, Nico Döttling, Sihang Pu
:
Practical Lattice-Based Distributed Signatures for a Small Number of Signers. 376-402 - Thibauld Feneuil:

Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD. 403-431 - Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco

, Gustave Tchoffo Saah:
Exploring SIDH-Based Signature Parameters. 432-456 - Luk Bettale, Delaram Kahrobaei

, Ludovic Perret, Javier A. Verbel:
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials. 457-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














