default search action
20th ACNS 2022: Rome, Italy
- Giuseppe Ateniese, Daniele Venturi:
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13269, Springer 2022, ISBN 978-3-031-09233-6
Encryption
- Shingo Sato, Keita Emura, Atsushi Takayasu:
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. 3-23 - Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala:
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. 24-44 - Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. 45-64
Attacks
- Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. 67-84 - Prakash Shrestha, Nitesh Saxena:
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. 85-104 - Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan:
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes. 105-125 - Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. 126-146 - Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. 147-169 - Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. 170-192 - Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom:
RSA Key Recovery from Digit Equivalence Information. 193-211 - Florette Martinez:
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators. 212-229 - Hosein Hadipour, Maria Eichlseder:
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges. 230-250
Cryptographic Protocols
- Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers:
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip. 253-272 - Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. 273-292 - Loïc Ferreira:
Privacy-Preserving Authenticated Key Exchange for Constrained Devices. 293-312 - Alisa Pankova, Jan Willemson:
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. 313-333
System Security
- Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya:
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception. 337-355 - Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun:
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. 356-375 - Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath:
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests. 376-395
Cryptographic Primitives
- Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. 399-418 - Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. 419-439 - Cecilia Boschini, Dario Fiore, Elena Pagnin:
Progressive and Efficient Verification for Digital Signatures. 440-458 - Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-Based Signatures from Lattices. 459-479 - Rajendra Kumar, Khoa Nguyen:
Covert Authentication from Lattices. 480-500 - S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu:
Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy. 501-520 - Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. 521-541 - Hamidreza Khoshakhlagh:
(Commit-and-Prove) Predictable Arguments with Privacy. 542-561
MPC
- Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities. 565-584 - Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. 585-604 - Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura:
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. 605-625 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee:
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security. 626-642 - Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka:
Efficient Two-Party Exponentiation from Quotient Transfer. 643-662 - Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. 663-683 - Karim Eldefrawy, Julian Loss, Ben Terner:
How Byzantine is a Send Corruption? 684-704
Blockchain
- Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova:
Babel Fees via Limited Liabilities. 707-726 - Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh:
FAST: Fair Auctions via Secret Transactions. 727-747 - Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. 748-768
Block-Cyphers
- Joachim Vandersmissen, Adrián Ranea, Bart Preneel:
A White-Box Speck Implementation Using Self-equivalence Encodings. 771-791 - Feifan Wang, Gaoli Wang:
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64. 792-808 - Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. 809-829
Post-quantum Cryptography
- Ming-Shing Chen, Tim Güneysu, Markus Krausz, Jan Philipp Thoma:
Carry-Less to BIKE Faster. 833-852 - Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels:
Faster Kyber and Dilithium on the Cortex-M4. 853-871 - Gustavo Banegas, Koen Zandberg, Emmanuel Baccelli, Adrian Herrmann, Benjamin Smith:
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices. 872-891 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. 892-912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.