


default search action
22nd CANS 2023: Augusta, GA, USA
- Jing Deng

, Vladimir Kolesnikov
, Alexander A. Schwarzmann
:
Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings. Lecture Notes in Computer Science 14342, Springer 2023, ISBN 978-981-99-7562-4
Schemes I
- Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:

Forward Security Under Leakage Resilience, Revisited. 3-27 - Yoshinori Aono

, Junji Shikata
:
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE. 28-50 - Ismail Afia

, Riham AlTawy
:
Traceable Policy-Based Signatures with Delegation. 51-72
Basic Primitives
- Timo Glaser, Alexander May

:
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium. 75-100 - Yuqing Zhao, Chun Guo, Weijia Wang:

Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. 101-125 - Kanat Alimanov, Zhenisbek Assylbekov:

Hardness of Learning AES with Gradient-Based Methods. 126-133
Security
- Thai Duong, Jiahui Gao, Duong Hieu Phan

, Ni Trieu:
Privacy-Preserving Digital Vaccine Passport. 137-161 - Animesh Kar

, Natalia Stakhanova
:
Exploiting Android Browser. 162-185 - Torsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman:

Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners. 186-207
MPC with Cards
- Takuto Yoshida

, Kodai Tanaka
, Keisuke Nakabayashi, Eikoh Chida
, Takaaki Mizuki
:
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols. 211-231 - Yoshifumi Manabe

, Kazumasa Shinagawa:
Free-XOR in Card-Based Garbled Circuits. 232-248
Cryptanalysis
- John Preuß Mattsson

:
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. 251-267 - Emanuele Bellini

, Alessandro De Piccoli
, Mattia Formenti
, David Gérault
, Paul Huynh
, Simone Pelizzola
, Sergio Polese, Andrea Visconti
:
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives. 268-292 - Hao Fan, Yonglin Hao, Qingju Wang

, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. 293-317 - Debranjan Pal

, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury:
New Techniques for Modeling SBoxes: An MILP Approach. 318-340
Blockchain
- Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha:

LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness. 343-367 - Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan

:
Improving Privacy of Anonymous Proof-of-Stake Protocols. 368-391 - Surbhi Shaw

, Ratna Dutta:
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys. 392-413 - Shumin Si

, Puwen Wei
, Xiuhan Lin, Li Liu:
CTA: Confidential Transactions Protocol with State Accumulator. 414-439
MPC and Secret Sharing
- Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu:

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets. 443-467 - Sabyasachi Dutta

, Shaoquan Jiang, Reihaneh Safavi-Naini:
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing. 468-493
Schemes II
- Hideaki Miyaji, Atsuko Miyaji

:
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties. 497-515 - Nan Li, Yingjiu Li, Atsuko Miyaji

, Yangguang Tian
, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. 516-537 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:

Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. 538-562 - Razvan Rosie:

A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. 563-587

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














