


default search action
23rd ACNS 2025: Munich, Germany - Workshops Part II
- Mark Manulis

:
Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part II. Lecture Notes in Computer Science 15654, Springer 2026, ISBN 978-3-032-01805-2
SCI - Secure Cryptographic Implementation
- Guillaume Barbu, Laurent Grémy, Roch Lescuyer:

Improved PACD-Based Attacks on RSA-CRT - Breaking the Signature Verification Countermeasure. 3-22 - Yuhan Qian, Jing Gao, Yuchen Zhong, Yaoling Ding, Jingjie Wu, Weiping Gong, Zihe Lin, An Wang:

One Time is Enough: Chosen-Ciphertext Side-Channel Attack on ML-KEM Cryptosystems. 23-40 - Xi Hu, Yunfei Cao, Hong Xiang:

A Review of Lattice Cryptography Attack Cost Model. 41-60 - HengSheng Wang, Shushang Wen, Wei Wang:

Exploring the HTTPS OCSP Ecosystem: A Comprehensive Study. 61-80 - Liangju Zhao, Luoqi Chen, Yufeng Tang, Zheng Gong:

Differential Fault Analysis Against White-Box SM4 Implementations. 81-100 - Thibaud Schoenauen, Clément Hoffmann, Charles Momin, Thomas Peters, François-Xavier Standaert:

Leveled Software Implementation of Polka and Comparison with Uniformly Masked Kyber. 101-117 - Haoyue Fu, Yunfei Cao, Hong Xiang, Congyi Zhang:

Research on the Security Estimation Framework for Code-Based Public Key Cryptography Algorithms. 118-131 - Yiyan Zhao, Jiwu Jing, Junlin He, Fangyu Zheng, Chunjing Kou:

Paper Document Anti-counterfeiting System Based on Digital Signatures and Image Processing. 132-151 - Yituo He

, Xinpeng Hao, Juanru Li, Yu Yu:
PQMagic: Towards Secure and Efficient Post Quantum Cryptography Implementations. 152-172 - Ruben Gonzalez:

Stateless Hash-Based Signatures for Post-Quantum Security Keys. 173-192 - Zhen Li, Anjiang Liu, An Wang, WeiJia Wang:

ChatGPT as Preprocessing Agents: A Case Study on Cryptographic Side-Channel Analysis. 193-210 - Jin Peng, Dachao Wang, Zheng Gong:

Improved Functional Bootstrapping of SM4 for Hybrid Homomorphic Encryption. 211-228 - Haoyang Xing, Chongyu Long, Anda Che, Fangyu Zheng, Jiwu Jing:

RCE-HVE: Plausible Deniability Against Multi-snapshot Adversaries with Amplified Storage. 229-247
PrivCrypt - Foundations and Applications of Privacy-Enhancing Cryptography
- Michele Battagliola

, Giuseppe D'Alconzo
, Andrea Gangemi
, Chiara Spadafora
:
Enhancing E-Voting with Multiparty Class Group Encryption. 251-273 - Sohto Chiku

, Keisuke Hara
, Junji Shikata
:
Hierarchical Identity-Based Matchmaking Encryption. 274-295 - Vincent Rieder

:
Silentium: Implementation of a Pseudorandom Correlation Generator for Beaver Triples. 296-317 - Rohitkumar R. Upadhyay

, Sahadeo Padhye
, Rajeev Anand Sahu
, Vishal Saraswat
:
Towards Privacy and Integrity: SNARK-Driven Verifiable FHE for Outsourced Computation. 318-333
SPIQE - Secure Protocol Implementations in the Quantum Era
- Evangelos Karatsiolis, Franziskus Kiefer, Juliane Krämer, Mirjam Loiero, Christian Tobias, Maximiliane Weishäupl:

Public Key Linting for ML-KEM and ML-DSA. 337-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














