default search action
21st CANS 2022: Dubai, United Arab Emirates
- Alastair R. Beresford, Arpita Patra, Emanuele Bellini:
Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings. Lecture Notes in Computer Science 13641, Springer 2022, ISBN 978-3-031-20973-4
Zero-Knowledge and MPC
- Michele Ciampi, Ivan Visconti:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 3-22 - Karim Baghery, Navid Ghaedi Bardeh:
Updatable NIZKs from Non-Interactive Zaps. 23-43 - Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas:
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's. 44-67
Public-Key Infrastructure
- Sebastian Neef, Nils Wisiol:
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. 71-88 - Kwan Yin Chan, Tsz Hon Yuen:
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. 89-121 - Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 122-142 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard. 143-164
Attacks and Countermeasures
- Shyam Murthy, Srinivas Vivek:
Passive Triangulation Attack on ORide. 167-187 - Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments. 188-199
Cryptanalysis and Provable Security
- Dongdong Lin, Shaozhen Chen, Manman Li, Zezhou Hou:
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN. 203-224 - Lukasz Krzywiecki, Hannes Salin:
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. 225-244 - Didier Alquié, Guy Chassé, Abderrahmane Nitaj:
Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 245-257 - Yuan Gao, Chun Guo:
Provable Security of rmHADES Structure. 258-276
Cryptographic Protocols
- Kalikinkar Mandal:
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters. 279-291 - Azam Soleimanian:
Anonymous Random Allocation and Its Applications. 292-313 - Luis Adan Saavedra, Alastair R. Beresford:
ACDC: Anonymous Crowdsourcing Using Digital Cash. 314-325
Blockchain and Payment Systems
- Ankit Gangwal, Rahul Valluri, Mauro Conti:
Analyzing Price Deviations in DeFi Oracles. 329-338 - Thiago Leucz Astrizi, Ricardo Custódio:
Redacting Blockchain Without Exposing Chameleon Hash Collisions. 339-358
Codes and Post-quantum Cryptography
- Françoise Levy-dit-Vehel, Maxime Roméas:
Efficient Proofs of Retrievability Using Expander Codes. 361-370 - Frederico Schardong, Alexandre Augusto Giron, Fernanda Larisa Müller, Ricardo Custódio:
Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era. 371-390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.