Login / Signup
ACNS (2)
2020
2024
2020
2024
Keyphrases
Publications
2024
Estuardo Alpirez Bock
,
Gustavo Banegas
,
Chris Brzuska
,
Lukasz Chmielewski
,
Kirthivaasan Puniamurthy
,
Milan Sorf
Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication.
ACNS (2)
(2024)
Vincent Hwang
,
Chi-Ting Liu
,
Bo-Yin Yang
Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime.
ACNS (2)
(2024)
Kelong Cong
,
Karim Eldefrawy
,
Nigel P. Smart
,
Ben Terner
The Key Lattice Framework for Concurrent Group Messaging.
ACNS (2)
(2024)
Tianbo Lu
,
Xia Ding
,
Jiaze Shang
,
Pengfei Zhao
,
Han Zhang
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.
ACNS (2)
(2024)
Sayani Sinha
,
Sikhar Patranabis
,
Debdeep Mukhopadhyay
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World.
ACNS (2)
(2024)
Robert Podschwadt
,
Parsa Ghazvinian
,
Mohammad GhasemiGol
,
Daniel Takabi
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption.
ACNS (2)
(2024)
Alexandre Augusto Giron
,
Frederico Schardong
,
Lucas Pandolfo Perin
,
Ricardo Custódio
,
Victor Valle
,
Víctor Mateu
Automated Issuance of Post-Quantum Certificates: A New Challenge.
ACNS (2)
(2024)
Xi Ling
,
Jiongchi Yu
,
Ziming Zhao
,
Zhihao Zhou
,
Haitao Xu
,
Binbin Chen
,
Fan Zhang
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining.
ACNS (2)
(2024)
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Ryo Hiromasa
,
Yoshihiro Koseki
,
Takahiro Matsuda
,
Yutaro Nishida
,
Yusuke Sakai
,
Jacob C. N. Schuldt
,
Satoshi Yasuda
Privacy-Preserving Verifiable CNNs.
ACNS (2)
(2024)
Roberta Cimorelli Belfiore
,
Andrea De Cosmo
,
Anna Lisa Ferrara
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions.
ACNS (2)
(2024)
Yongming Fan
,
Yuquan Xu
,
Christina Garman
SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations.
ACNS (2)
(2024)
Hyesun Kwak
,
Dongwon Lee
,
Yongsoo Song
,
Sameer Wagh
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation.
ACNS (2)
(2024)
Mathy Vanhoef
,
Jeroen Robben
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks.
ACNS (2)
(2024)
Eric Wagner
,
Martin Serror
,
Klaus Wehrle
,
Martin Henze
When and How to Aggregate Message Authentication Codes on Lossy Channels?
ACNS (2)
(2024)
Uddipana Dowerah
,
Aikaterini Mitrokotsa
Decentralized Private Stream Aggregation from Lattices.
ACNS (2)
(2024)
Ren Taguchi
,
Atsushi Takayasu
On the Untapped Potential of the Quantum FLT-Based Inversion.
ACNS (2)
(2024)
Christoph Dobraunig
,
Bart Mennink
Generalized Initialization of the Duplex Construction.
ACNS (2)
(2024)
Elena Andreeva
,
Benoît Cogliati
,
Virginie Lallemand
,
Marine Minier
,
Antoon Purnal
,
Arnab Roy
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function.
ACNS (2)
(2024)
Christina Boura
,
Patrick Derbez
,
Margot Funk
Alternative Key Schedules for the AES.
ACNS (2)
(2024)
volume 14584, 2024
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II
ACNS (2)
14584 (2024)
2021
Hannah Davis
,
Felix Günther
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.
ACNS (2)
(2021)
David Cash
,
Ruth Ng
,
Adam Rivkin
Improved Structured Encryption for SQL Databases via Hybrid Indexing.
ACNS (2)
(2021)
Sonia Bogos
,
Dario Korolija
,
Thomas Locher
,
Serge Vaudenay
Towards Efficient LPN-Based Symmetric Encryption.
ACNS (2)
(2021)
Manohar Raavi
,
Simeon Wuthier
,
Pranav Chandramouli
,
Yaroslav Balytskyi
,
Xiaobo Zhou
,
Sang-Yoon Chang
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms.
ACNS (2)
(2021)
Ruben Groot Roessink
,
Andreas Peter
,
Florian Hahn
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
ACNS (2)
(2021)
Mark Abspoel
,
Anders P. K. Dalskov
,
Daniel Escudero
,
Ariel Nof
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.
ACNS (2)
(2021)
Rajat Tandon
,
Abhinav Palia
,
Jaydeep Ramani
,
Brandon Paulsen
,
Genevieve Bartlett
,
Jelena Mirkovic
Defending Web Servers Against Flash Crowd Attacks.
ACNS (2)
(2021)
Stéphanie Delaune
,
Patrick Derbez
,
Paul Huynh
,
Marine Minier
,
Victor Mollimard
,
Charles Prud'homme
Efficient Methods to Search for Best Differential Characteristics on SKINNY.
ACNS (2)
(2021)
Shangcheng Shi
,
Xianbo Wang
,
Wing Cheong Lau
Breaking and Fixing Third-Party Payment Service for Mobile Apps.
ACNS (2)
(2021)
Tim Heldmann
,
Thomas Schneider
,
Oleksandr Tkachenko
,
Christian Weinert
,
Hossein Yalame
LLVM-Based Circuit Compilation for Practical Secure Computation.
ACNS (2)
(2021)
Thales Bandiera Paiva
,
Routo Terada
Cryptanalysis of the Binary Permuted Kernel Problem.
ACNS (2)
(2021)
Panagiotis Chatzigiannis
,
Foteini Baldimtsi
,
Konstantinos Chalkias
SoK: Auditability and Accountability in Distributed Payment Systems.
ACNS (2)
(2021)
Shuangpeng Bai
,
Hui Wen
,
Dongliang Fang
,
Yue Sun
,
Puzhuo Liu
,
Limin Sun
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.
ACNS (2)
(2021)
Yuede Ji
,
Lei Cui
,
H. Howie Huang
Vestige: Identifying Binary Code Provenance for Vulnerability Detection.
ACNS (2)
(2021)
F. W. Dekker
,
Zekeriya Erkin
Privacy-Preserving Data Aggregation with Probabilistic Range Validation.
ACNS (2)
(2021)
Rogério V. M. Rocha
,
Pedro Paulo Libório
,
Harsh Kupwade Patil
,
Diego F. Aranha
A Differentially Private Hybrid Approach to Traffic Monitoring.
ACNS (2)
(2021)
Qian Cui
,
Guy-Vincent Jourdan
,
Gregor v. Bochmann
,
Iosif-Viorel Onut
Proactive Detection of Phishing Kit Traffic.
ACNS (2)
(2021)
Yaron Gvili
,
Julie Ha
,
Sarah Scheffler
,
Mayank Varia
,
Ziling Yang
,
Xinyuan Zhang
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-quantum Signatures.
ACNS (2)
(2021)
Andy Russon
Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.
ACNS (2)
(2021)
volume 12727, 2021
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II
ACNS (2)
12727 (2021)
2020
Anh-Tu Hoang
,
Barbara Carminati
,
Elena Ferrari
Cluster-Based Anonymization of Knowledge Graphs.
ACNS (2)
(2020)
Daniel Gardham
,
Mark Manulis
,
Constantin Catalin Dragan
Biometric-Authenticated Searchable Encryption.
ACNS (2)
(2020)
Xuan Thanh Do
,
Duong Hieu Phan
,
Moti Yung
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
ACNS (2)
(2020)
Karim Eldefrawy
,
Michael Locasto
,
Norrathep Rattanavipanon
,
Hassen Saïdi
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables.
ACNS (2)
(2020)
Ilkan Esiyok
,
Lucjan Hanzlik
,
Robert Künnemann
,
Lena Marie Budde
,
Michael Backes
TrollThrottle - Raising the Cost of Astroturfing.
ACNS (2)
(2020)
Maximilian Hils
,
Rainer Böhme
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069.
ACNS (2)
(2020)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
,
Tran Van Sang
,
Rie Shigetomi Yamaguchi
Human Factors in Homograph Attack Recognition.
ACNS (2)
(2020)
Pierpaolo Santucci
,
Emiliano Ingrassia
,
Giulio Picierro
,
Marco Cesati
MemShield: GPU-Assisted Software Memory Encryption.
ACNS (2)
(2020)
Juan E. Rubio
,
Cristina Alcaraz
,
Javier López
Game Theory-Based Approach for Defense Against APTs.
ACNS (2)
(2020)
volume 12147, 2020
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II.
ACNS (2)
12147 (2020)