


default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part II
- Christina Pöpper

, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14584, Springer 2024, ISBN 978-3-031-54772-0
Post-quantum
- Alexandre Augusto Giron

, Frederico Schardong
, Lucas Pandolfo Perin
, Ricardo Custódio
, Victor Valle, Víctor Mateu
:
Automated Issuance of Post-Quantum Certificates: A New Challenge. 3-23 - Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang:

Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime. 24-46 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:

Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 47-78 - Ren Taguchi

, Atsushi Takayasu
:
On the Untapped Potential of the Quantum FLT-Based Inversion. 79-100 - Estuardo Alpirez Bock, Gustavo Banegas

, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf
:
Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication. 101-130
Cryptographic Protocols II
- Kelong Cong

, Karim Eldefrawy
, Nigel P. Smart
, Ben Terner
:
The Key Lattice Framework for Concurrent Group Messaging. 133-162 - Roberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara:

Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. 163-188 - Uddipana Dowerah, Aikaterini Mitrokotsa:

Decentralized Private Stream Aggregation from Lattices. 189-214
Wireless and Networks
- Mathy Vanhoef

, Jeroen Robben
:
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks. 217-240 - Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze

:
When and How to Aggregate Message Authentication Codes on Lossy Channels? 241-264 - Tianbo Lu

, Xia Ding
, Jiaze Shang
, Pengfei Zhao
, Han Zhang
:
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. 265-282 - Xi Ling, Jiongchi Yu, Ziming Zhao

, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. 283-309
Privacy and Homomorphic Encryption
- Robert Podschwadt

, Parsa Ghazvinian
, Mohammad GhasemiGol, Daniel Takabi:
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption. 313-339 - Yongming Fan, Yuquan Xu, Christina Garman:

SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations. 340-372 - Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob C. N. Schuldt, Satoshi Yasuda:

Privacy-Preserving Verifiable CNNs. 373-402 - Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh:

A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation. 403-430
Symmetric Crypto
- Elena Andreeva

, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
:
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function. 433-459 - Christoph Dobraunig, Bart Mennink:

Generalized Initialization of the Duplex Construction. 460-484 - Christina Boura, Patrick Derbez, Margot Funk:

Alternative Key Schedules for the AES. 485-506

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














