default search action
22nd CANS 2023: Augusta, GA, USA
- Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann:
Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings. Lecture Notes in Computer Science 14342, Springer 2023, ISBN 978-981-99-7562-4
Schemes I
- Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward Security Under Leakage Resilience, Revisited. 3-27 - Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE. 28-50 - Ismail Afia, Riham AlTawy:
Traceable Policy-Based Signatures with Delegation. 51-72
Basic Primitives
- Timo Glaser, Alexander May:
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium. 75-100 - Yuqing Zhao, Chun Guo, Weijia Wang:
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. 101-125 - Kanat Alimanov, Zhenisbek Assylbekov:
Hardness of Learning AES with Gradient-Based Methods. 126-133
Security
- Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu:
Privacy-Preserving Digital Vaccine Passport. 137-161 - Animesh Kar, Natalia Stakhanova:
Exploiting Android Browser. 162-185 - Torsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman:
Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners. 186-207
MPC with Cards
- Takuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, Takaaki Mizuki:
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols. 211-231 - Yoshifumi Manabe, Kazumasa Shinagawa:
Free-XOR in Card-Based Garbled Circuits. 232-248
Cryptanalysis
- John Preuß Mattsson:
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. 251-267 - Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives. 268-292 - Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. 293-317 - Debranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury:
New Techniques for Modeling SBoxes: An MILP Approach. 318-340
Blockchain
- Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha:
LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness. 343-367 - Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan:
Improving Privacy of Anonymous Proof-of-Stake Protocols. 368-391 - Surbhi Shaw, Ratna Dutta:
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys. 392-413 - Shumin Si, Puwen Wei, Xiuhan Lin, Li Liu:
CTA: Confidential Transactions Protocol with State Accumulator. 414-439
MPC and Secret Sharing
- Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu:
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets. 443-467 - Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini:
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing. 468-493
Schemes II
- Hideaki Miyaji, Atsuko Miyaji:
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties. 497-515 - Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. 516-537 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. 538-562 - Razvan Rosie:
A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. 563-587
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.