default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2021
- Behzad Abdolmaleki, Daniel Slamanig:
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs. CANS 2021: 492-512 - Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson:
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs. CANS 2021: 95-115 - Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
How Distance-Bounding Can Detect Internet Traffic Hijacking. CANS 2021: 355-371 - Marcel Armour, Carlos Cid:
Partition Oracles from Weak Key Forgeries. CANS 2021: 42-62 - Karim Baghery, Mahdi Sedaghat:
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. CANS 2021: 531-551 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:
Issuer-Hiding Attribute-Based Credentials. CANS 2021: 158-178 - Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. CANS 2021: 435-459 - Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:
The Matrix Reloaded: Multiplication Strategies in FrodoKEM. CANS 2021: 72-91 - Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas:
Attestation Waves: Platform Trust via Remote Power Analysis. CANS 2021: 460-482 - Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa:
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem. CANS 2021: 253-272 - Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper:
Towards Quantum Large-Scale Password Guessing on Real-World Distributions. CANS 2021: 412-431 - Antonio Faonio:
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model. CANS 2021: 273-291 - Julian Fietkau, David Pascal Runge, Jean-Pierre Seifert:
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services. CANS 2021: 315-333 - Tamara Finogina, Javier Herranz, Enrique Larraia:
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting. CANS 2021: 483-491 - Ashley Fraser, Lydia Garms, Anja Lehmann:
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability. CANS 2021: 200-221 - Ashley Fraser, Elizabeth A. Quaglia:
Report and Trace Ring Signatures. CANS 2021: 179-199 - Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa:
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training. CANS 2021: 392-411 - Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - Loïs Huguenin-Dumittan, Serge Vaudenay:
FO-like Combiners and Hybrid Post-Quantum Cryptography. CANS 2021: 225-244 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption. CANS 2021: 63-71 - Peeter Laud:
Linear-Time Oblivious Permutations for SPDZ. CANS 2021: 245-252 - Nolan Miranda, Foo Yee Yeo, Vipin Singh Sehrawat:
Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions. CANS 2021: 334-354 - Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. CANS 2021: 295-314 - Bojan Novkovic, Marin Golub:
SoK: Secure Memory Allocation. CANS 2021: 372-391 - Michaella Pettit:
Efficient Threshold-Optimal ECDSA. CANS 2021: 116-135 - Pablo Rauzy, Ali Nehme:
THC: Practical and Cost-Effective Verification of Delegated Computation. CANS 2021: 513-530 - Mahdi Sedaghat, Bart Preneel:
Cross-Domain Attribute-Based Access Control Encryption. CANS 2021: 3-23 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
GMMT: A Revocable Group Merkle Multi-tree Signature Scheme. CANS 2021: 136-157 - Mauro Conti, Marc Stevens, Stephan Krenn:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-17 15:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint