default search action
18th ACNS 2020: Rome, Italy - Part I
- Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7
Cryptographic Protocols
- Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities. 3-23 - Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey:
Random Walks and Concurrent Zero-Knowledge. 24-44 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Secure and Efficient Delegation of Elliptic-Curve Pairing. 45-66
Cryptographic Primitives
- Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai:
Tweaking Key-Alternating Feistel Block Ciphers. 69-88 - Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode. 89-109 - Hilder Vitor Lima Pereira:
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic. 110-129 - Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. 130-149
Attacks on Cryptographic Primitives
- Liliya Kraleva, Tomer Ashur, Vincent Rijmen:
Rotational Cryptanalysis on MAC Algorithm Chaskey. 153-168 - Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin:
How Not to Create an Isogeny-Based PAKE. 169-186 - Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? 187-207 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes. 208-227
Encryption and Signature
- Peter Chvojka, Tibor Jager, Saqib A. Kakvi:
Offline Witness Encryption with Semi-adaptive Security. 231-250 - Intae Kim, Seong Oun Hwang, Willy Susilo, Joonsang Baek, Jongkil Kim:
Efficient Anonymous Multi-group Broadcast Encryption. 251-270 - Antonio Faonio, Dario Fiore:
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption. 271-291 - Susan Hohenberger, Brent Waters:
New Methods and Abstractions for RSA-Based Forward Secure Signatures. 292-312
Blockchain and Cryptocurrency
- Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan:
Minting Mechanism for Proof of Stake Blockchains. 315-334 - Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -. 335-354
Secure Multi-party Computation
- Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida:
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks. 357-376 - Marina Blanton, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority. 377-397 - Niek J. Bouman, Niels de Vreede:
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals. 398-417
Post-Quantum Cryptography
- Bin Wang, Xiaozhuo Gu, Yingshan Yang:
Saber on ESP32. 421-440 - Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. 441-460 - Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. 461-480 - Aaron Hutchinson, Jason T. LeGrow, Brian Koziel, Reza Azarderakhsh:
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors. 481-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.