default search action
16th ACNS 2018: Leuven, Belgium
- Bart Preneel, Frederik Vercauteren:
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings. Lecture Notes in Computer Science 10892, Springer 2018, ISBN 978-3-319-93386-3
Cryptographic Protocols
- Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. 3-21 - Yotam Harchol, Ittai Abraham, Benny Pinkas:
Distributed SSH Key Management with Proactive RSA Threshold Signatures. 22-43 - Georg Fuchsbauer, Michele Orrù:
Non-interactive Zaps of Knowledge. 44-62
Side Channel Attacks and Tamper Resistance
- Jean-Sébastien Coron:
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. 65-82 - Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-By Key-Extraction Cache Attacks from Portable Code. 83-102 - Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. 103-120 - Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-malleable Codes with Split-State Refresh. 121-139
Digital Signatures
- Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson:
Efficient Unconditionally Secure Signatures Using Universal Hashing. 143-162 - Cecilia Boschini, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. 163-182 - Dario Catalano, Dario Fiore, Luca Nizzardo:
On the Security Notions for Homomorphic Signatures. 183-201 - Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. 202-220 - Johannes Blömer, Jan Bobolz:
Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures. 221-239
Privacy Preserving Computation
- Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon:
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. 243-261 - Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. 262-279 - Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente:
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection. 280-300
Multi-party Computation
- Geoffroy Couteau:
New Protocols for Secure Equality Test and Comparison. 303-320 - Peter Sebastian Nordholt, Meilof Veeningen:
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. 321-339 - Daniel Genkin, S. Dov Gordon, Samuel Ranellucci:
Best of Both Worlds in Secure Computation, with Low Communication Overhead. 340-359 - Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. 360-378
Symmetric Key Primitives
- Ralph Ankele, Florian Böhl, Simon Friedberger:
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth. 381-399 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier:
KangarooTwelve: Fast Hashing Based on Keccak-p. 400-418
Symmetric Key Cryptanalysis
- Yu Sasaki:
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher. 421-439 - F. Betül Durak, Serge Vaudenay:
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. 440-458 - Ralph Ankele, Eik List:
Differential Cryptanalysis of Round-Reduced Sparx-64/128. 459-475 - Serge Vaudenay, Damian Vizár:
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. 476-494
Public Key Encryption
- Jiangtao Li, Junqing Gong:
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. 497-515 - Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. 516-534 - Xavier Boyen, Qinyi Li:
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. 535-553
Authentication and Biometrics
- Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-Region Authentication. 557-578 - Handan Kilinç, Serge Vaudenay:
Formal Analysis of Distance Bounding with Secure Hardware. 579-597 - Ivan Oliveira Nunes, Gene Tsudik:
KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks. 598-615 - Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric. 616-633
Cloud and Peer-to-Peer Security
- Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-client Verifiable Computation. 637-656 - Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena:
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation. 657-677 - Suyash Kandele, Souradyuti Paul:
Message-Locked Encryption with File Update. 678-695 - Seny Kamara, Alptekin Küpçü:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. 696-714
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.