default search action
21st ACNS 2023: Kyoto, Japan - Part II
- Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13906, Springer 2023, ISBN 978-3-031-33490-0
Embedded Security
- Elena Andreeva, Andreas Weninger:
A Forkcipher-Based Pseudo-Random Number Generator. 3-31 - Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi:
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access. 32-61 - Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu:
Recommendation for a Holistic Secure Embedded ISA Extension. 62-84 - Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. 85-111
Privacy-Preserving Protocols
- Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities. 115-142 - Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. 143-166 - Johannes Ernst, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption. 167-196 - Pengzhen Ke, Liang Feng Zhang:
Private Information Retrieval with Result Verification for More Servers. 197-216
Isogeny-Based Cryptography
- Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
Practical Robust DKG Protocols for CSIDH. 219-247 - Kelong Cong, Yi-Fu Lai, Shai Levin:
Efficient Isogeny Proofs Using Generic Techniques. 248-275 - Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May:
Low Memory Attacks on Small Key CSIDH. 276-304
Encryption
- Daniele Friolo, Matteo Salvino, Daniele Venturi:
On the Complete Non-malleability of the Fujisaki-Okamoto Transform. 307-335 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. 336-365 - Huangting Wu, Sherman S. M. Chow:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. 366-395 - Vlasis Koutsos, Dimitrios Papadopoulos:
Publicly Auditable Functional Encryption. 396-425
Advanced Primitives
- Amit Deo, Charlie Grover:
Robustly Reusable Fuzzy Extractors in a Post-quantum World. 429-459 - Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager:
Subversion-Resilient Authenticated Encryption Without Random Oracles. 460-483 - Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen:
Scored Anonymous Credentials. 484-515 - Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. 516-538
Multiparty Computation
- Keitaro Hiwatashi, Koji Nuida:
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS. 541-554 - Michele Ciampi, Yu Xia:
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions. 555-581 - T.-H. Hubert Chan, Ting Wen, Hao Xie, Quan Xue:
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem. 582-610 - Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai:
A New Approach to Garbled Circuits. 611-641
Blockchain
- Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov:
Mt. Random: Multi-tiered Randomness Beacons. 645-674 - Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust:
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era. 675-698 - I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. 699-725
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.