


default search action
23rd ACNS 2025: Munich, Germany - Part I
- Marc Fischlin
, Veelasha Moonsamy
:
Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15825, Springer 2025, ISBN 978-3-031-95760-4
Encryption and Secret Sharing
- Danilo Francati
, Valeria Huang, Daniele Venturi
:
Registered Matchmaking Encryption. 3-32 - Sarah Miracle, Scott Yilek:
Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors. 33-61 - Hirotomo Shinoki, Hisayoshi Sato, Masayuki Yoshino:
Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices. 62-88 - Karim Baghery
, Noah Knapen, Georgio Nicolas
, Mahdi Rahimi
:
Pre-constructed Publicly Verifiable Secret Sharing and Applications. 89-119
Blockchains and Decentralized Systems
- Jens-Rene Giesen, Sébastien Andreina, Michael Rodler, Ghassan Karame, Lucas Davi:
HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts. 123-152 - Xiangyu Su
, Xavier Défago, Mario Larangeira
, Kazuyuki Mori, Takuya Oda, Yasumasa Tamura, Keisuke Tanaka
:
Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment. 153-183 - Christina Ovezik, Dimitris Karakostas, Mary Milad, Daniel W. Woods, Aggelos Kiayias:
SoK: Measuring Blockchain Decentralization. 184-214 - Patrik Keller:
Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols. 215-243 - Jeffrey Burdges, Elizabeth Crites, Handan Kilinç Alper, Alistair Stewart, Sergey Vasilyev:
Sassafras: Efficient Batch Single Leader Election. 244-273
Multi-party Computation
- Kota Isayama, Koki Jimbo
, Naohiro Okamoto, Kunihiko Sadakane
, Kazunari Tozawa
:
Oblivious Suffix Sorting: A Multi-Party Computation Scheme for Secure and Efficient Suffix Sorting. 277-307 - Antoine Urban
, Matthieu Rambaud
:
Share&Shrink: Efficient and Delegatable MPC in One Broadcast then Asynchrony. 308-338 - Michele Ciampi
, Jure Sternad, Yu Xia
:
Delayed-Input Multi-party Computation. 339-368 - Sathvika Balumuri, Edward Eaton, Philippe Lamontagne
:
Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes. 369-397
Network Security
- Enrico Bassetti
, Edoardo Di Paolo
, Francesco Drago, Mauro Conti
, Angelo Spognardi
:
Opening Pandora's Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing. 401-423 - Quincy Bayer, Robert Esswein, Samuel Mergendahl, Jonathan Ruffley, Mai Abdelhakim, Robert K. Cunningham:
TAU: Trust via Asynchronous Updates for Satellite Network Resiliency. 424-452
Cryptographic Primitives and Protocols
- Céline Chevalier, Guirec Lebrun, Ange Martinelli:
Spilling-Cascade: An Optimal PKE Combiner for KEM Hybridization. 455-485 - Mark Manulis
, Hugo Nartz:
Distributed Asynchronous Remote Key Generation. 486-515 - José Ignacio Escribano Pablos
, María Isabel González Vasco
, Angel L. Pérez del Pozo, Claudio Soriente
:
Anonymous Authenticated Key Exchange. 516-546 - Naoki Shimoe, Noboru Kunihiro
:
Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor. 547-571 - Karen Azari, Andreas Ellison:
Tighter Provable Security for TreeKEM. 572-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.