default search action
17th ACNS 2019: Bogota, Colombia
- Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung:
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11464, Springer 2019, ISBN 978-3-030-21567-5
Integrity and Cryptanalysis
- Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-malleable Codes. 3-23 - Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption. 24-42 - Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. 43-63
Digital Signature and MAC
- Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. 67-88 - Daniel Gardham, Mark Manulis:
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length. 89-109 - Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. 110-130 - Alexander Moch, Eik List:
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. 131-151
Software and Systems Security
- Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia:
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. 155-174 - Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Nils Ole Tippenhauer:
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems. 175-195 - John Henry Castellanos, Jianying Zhou:
A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. 196-216 - Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. 217-237
Blockchain and Cryptocurrency
- Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen:
Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. 241-258 - Karim Eldefrawy, Ashish Gehani, Alexandre Matton:
Longitudinal Analysis of Misuse of Bitcoin. 259-278
Post Quantum Cryptography
- Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe:
Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates. 281-301 - Zhengzhong Jin, Yunlei Zhao:
Generic and Practical Key Establishment from Lattice. 302-322 - Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. 323-343 - Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. 344-362 - Xiong Fan, Feng-Hao Liu:
Proxy Re-Encryption and Re-Signatures from Lattices. 363-382
Public Key and Commitment
- Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
DL-Extractable UC-Commitment Schemes. 385-405 - Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. 406-425 - Edouard Dufour Sans, David Pointcheval:
Unbounded Inner-Product Functional Encryption with Succinct Keys. 426-441 - Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. 442-462
Theory of Cryptographic Implementations
- Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Public Immunization Against Complete Subversion Without Random Oracles. 465-485 - Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. 486-506
Privacy Preserving Techniques
- Abdelrahaman Aly, Nigel P. Smart:
Benchmarking Privacy Preserving Scientific Operations. 509-529 - Aner Ben-Efraim, Michael Nielsen, Eran Omri:
Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing. 530-549 - Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. 550-570 - Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi:
Masking Fuzzy-Searchable Public Databases. 571-591 - Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. 592-611
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.