Login / Signup
ACNS (1)
2020
2024
2020
2024
Keyphrases
Publications
2024
Keita Emura
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search.
ACNS (1)
(2024)
Danilo Francati
,
Daniele Venturi
Non-malleable Fuzzy Extractors.
ACNS (1)
(2024)
Xavier Carpent
,
Seoyeon Hwang
,
Gene Tsudik
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
ACNS (1)
(2024)
Pengfei Wang
,
Xiangyu Su
,
Mario Larangeira
,
Keisuke Tanaka
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing.
ACNS (1)
(2024)
Yusuke Naito
,
Yu Sasaki
,
Takeshi Sugawara
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
ACNS (1)
(2024)
Robin Berger
,
Felix Dörre
,
Alexander Koch
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption.
ACNS (1)
(2024)
Chloé Cachet
,
Ariel Hamlin
,
Maryam Rezapour
,
Benjamin Fuller
Upgrading Fuzzy Extractors.
ACNS (1)
(2024)
Tore Kasper Frederiksen
,
Jonas Lindstrøm
,
Mikkel Wienberg Madsen
,
Anne Dorte Spangsberg
A New Approach to Efficient and Secure Fixed-Point Computation.
ACNS (1)
(2024)
Edoardo Liberati
,
Alessandro Visintin
,
Riccardo Lazzeretti
,
Mauro Conti
,
A. Selcuk Uluagac
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
ACNS (1)
(2024)
Mengyu Zhang
,
Long Wang
,
Xiaoping Zhang
,
Zhuotao Liu
,
Yisong Wang
,
Han Bao
Efficient Clustering on Encrypted Data.
ACNS (1)
(2024)
Kittiphop Phalakarn
,
Toru Nakamura
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets.
ACNS (1)
(2024)
Thi Van Thao Doan
,
Olivier Pereira
,
Thomas Peters
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections.
ACNS (1)
(2024)
Andrea Basso
,
Mingjie Chen
,
Tako Boris Fouotsa
,
Péter Kutas
,
Abel Laval
,
Laurane Marco
,
Gustave Tchoffo Saah
Exploring SIDH-Based Signature Parameters.
ACNS (1)
(2024)
Nabil Alkeilani Alkadri
,
Nico Döttling
,
Sihang Pu
Practical Lattice-Based Distributed Signatures for a Small Number of Signers.
ACNS (1)
(2024)
Pascal Bemmann
,
Sebastian Berndt
,
Rongmao Chen
Subversion-Resilient Signatures Without Random Oracles.
ACNS (1)
(2024)
Chris Brzuska
,
Christoph Egger
,
Kirthivaasan Puniamurthy
CryptoZoo: A Viewer for Reduction Proofs.
ACNS (1)
(2024)
Thibauld Feneuil
Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD.
ACNS (1)
(2024)
Luk Bettale
,
Delaram Kahrobaei
,
Ludovic Perret
,
Javier A. Verbel
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials.
ACNS (1)
(2024)
volume 14583, 2024
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I
ACNS (1)
14583 (2024)
2023
Qisheng Zhang
,
Jin-Hee Cho
,
Terrence J. Moore
,
Dan Dongseong Kim
,
Hyuk Lim
,
Frederica Free-Nelson
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning.
ACNS (1)
(2023)
Éric Sageloli
,
Pierre Pébereau
,
Pierrick Méaux
,
Céline Chevalier
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
ACNS (1)
(2023)
Cong Tian
,
Dengpan Ye
,
Chuanxi Chen
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis.
ACNS (1)
(2023)
Hamdi Friji
,
Alexis Olivereau
,
Mireille Sarkiss
Efficient Network Representation for GNN-Based Intrusion Detection.
ACNS (1)
(2023)
Yong Liu
,
Zejun Xiang
,
Siwei Chen
,
Shasha Zhang
,
Xiangyong Zeng
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials.
ACNS (1)
(2023)
Subhadeep Banik
,
Daniel Collins
,
Willi Meier
Near Collision Attack Against Grain V1.
ACNS (1)
(2023)
Sabyasachi Karati
Binary Kummer Line.
ACNS (1)
(2023)
Ping-Lun Wang
,
Kai-Hsiang Chou
,
Shou-Ching Hsiao
,
Ann Tene Low
,
Tiffany Hyun-Jin Kim
,
Hsu-Chun Hsiao
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
ACNS (1)
(2023)
Anup Kumar Kundu
,
Shibam Ghosh
,
Dhiman Saha
,
Mostafizar Rahman
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT.
ACNS (1)
(2023)
Barbara Gigerl
,
Robert Primas
,
Stefan Mangard
Formal Verification of Arithmetic Masking in Hardware and Software.
ACNS (1)
(2023)
Luke Harmon
,
Gaetan Delavignette
,
Arnab Roy
,
David William Honorio Araujo da Silva
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption.
ACNS (1)
(2023)
Agathe Cheriere
,
Nicolas Aragon
,
Tania Richmond
,
Benoît Gérard
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding.
ACNS (1)
(2023)
Yang Tao
,
Rui Zhang
,
Yunfeng Ji
Forward Security of Fiat-Shamir Lattice Signatures.
ACNS (1)
(2023)
Bénédikt Tran
,
Serge Vaudenay
A Gapless Post-quantum Hash Proof System in the Hamming Metric.
ACNS (1)
(2023)
Conor Atkins
,
Benjamin Zi Hao Zhao
,
Hassan Jameel Asghar
,
Ian D. Wood
,
Mohamed Ali Kâafar
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
ACNS (1)
(2023)
Hongbin Chen
,
Chaohao Fu
,
Na Ruan
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning.
ACNS (1)
(2023)
Kenta Tani
,
Noboru Kunihiro
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences.
ACNS (1)
(2023)
Martin Schwarzl
,
Erik Kraft
,
Daniel Gruss
Layered Binary Templating.
ACNS (1)
(2023)
Youssef El Housni
Pairings in Rank-1 Constraint Systems.
ACNS (1)
(2023)
Sara Bardi
,
Mauro Conti
,
Luca Pajola
,
Pier Paolo Tricomi
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages.
ACNS (1)
(2023)
Nick Frymann
,
Daniel Gardham
,
Mark Manulis
,
Hugo Nartz
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems.
ACNS (1)
(2023)
Yunlong Mao
,
Ziqin Dang
,
Yu Lin
,
Tianling Zhang
,
Yuan Zhang
,
Jingyu Hua
,
Sheng Zhong
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
ACNS (1)
(2023)
Sahiba Suryawanshi
,
Dhiman Saha
,
Shashwat Jaiswal
TIDAL: Practical Collisions on State-Reduced Keccak Variants.
ACNS (1)
(2023)
Alex Biryukov
,
Luan Cardoso dos Santos
,
Je Sen Teh
,
Aleksei Udovenko
,
Vesselin Velichkov
Meet-in-the-Filter and Dynamic Counting with Applications to Speck.
ACNS (1)
(2023)
Hiroki Okada
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
,
Tsuyoshi Takagi
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence.
ACNS (1)
(2023)
Mao V. Ngo
,
Tram Truong-Huu
,
Dima Rabadi
,
Jia Yi Loo
,
Sin G. Teo
Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning.
ACNS (1)
(2023)
Kilian Becher
,
J. A. Gregor Lagodzinski
,
Javier Parra-Arnau
,
Thorsten Strufe
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols.
ACNS (1)
(2023)
volume 13905, 2023
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I
ACNS (1)
13905 (2023)
2021
Xiuhua Wang
,
Harry W. H. Wong
,
Sherman S. M. Chow
Access Control Encryption from Group Encryption.
ACNS (1)
(2021)
Angèle Bossuat
,
Xavier Bultel
Unlinkable and Invisible γ-Sanitizable Signatures.
ACNS (1)
(2021)
volume 12726, 2021
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I
ACNS (1)
12726 (2021)