default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part II
- Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14584, Springer 2024, ISBN 978-3-031-54772-0
Post-quantum
- Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, Víctor Mateu:
Automated Issuance of Post-Quantum Certificates: A New Challenge. 3-23 - Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang:
Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime. 24-46 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 47-78 - Ren Taguchi, Atsushi Takayasu:
On the Untapped Potential of the Quantum FLT-Based Inversion. 79-100 - Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf:
Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication. 101-130
Cryptographic Protocols II
- Kelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner:
The Key Lattice Framework for Concurrent Group Messaging. 133-162 - Roberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara:
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. 163-188 - Uddipana Dowerah, Aikaterini Mitrokotsa:
Decentralized Private Stream Aggregation from Lattices. 189-214
Wireless and Networks
- Mathy Vanhoef, Jeroen Robben:
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks. 217-240 - Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
When and How to Aggregate Message Authentication Codes on Lossy Channels? 241-264 - Tianbo Lu, Xia Ding, Jiaze Shang, Pengfei Zhao, Han Zhang:
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. 265-282 - Xi Ling, Jiongchi Yu, Ziming Zhao, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. 283-309
Privacy and Homomorphic Encryption
- Robert Podschwadt, Parsa Ghazvinian, Mohammad GhasemiGol, Daniel Takabi:
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption. 313-339 - Yongming Fan, Yuquan Xu, Christina Garman:
SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations. 340-372 - Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob C. N. Schuldt, Satoshi Yasuda:
Privacy-Preserving Verifiable CNNs. 373-402 - Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh:
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation. 403-430
Symmetric Crypto
- Elena Andreeva, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy:
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function. 433-459 - Christoph Dobraunig, Bart Mennink:
Generalized Initialization of the Duplex Construction. 460-484 - Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. 485-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.