


default search action
20th CANS 2021: Vienna, Austria
- Mauro Conti

, Marc Stevens
, Stephan Krenn
:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5
Encryption
- Mahdi Sedaghat

, Bart Preneel:
Cross-Domain Attribute-Based Access Control Encryption. 3-23 - Martin Hell, Thomas Johansson

, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. 24-41 - Marcel Armour

, Carlos Cid
:
Partition Oracles from Weak Key Forgeries. 42-62 - Alberto Ibarrondo

, Hervé Chabanne, Melek Önen:
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption. 63-71 - Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:

The Matrix Reloaded: Multiplication Strategies in FrodoKEM. 72-91
Signatures
- Nabil Alkeilani Alkadri

, Patrick Harasser, Christian Janson:
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs. 95-115 - Michaella Pettit:

Efficient Threshold-Optimal ECDSA. 116-135 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:

GMMT: A Revocable Group Merkle Multi-tree Signature Scheme. 136-157 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:

Issuer-Hiding Attribute-Based Credentials. 158-178 - Ashley Fraser, Elizabeth A. Quaglia

:
Report and Trace Ring Signatures. 179-199 - Ashley Fraser

, Lydia Garms, Anja Lehmann:
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability. 200-221
Cryptographic Schemes and Protocols
- Loïs Huguenin-Dumittan, Serge Vaudenay:

FO-like Combiners and Hybrid Post-Quantum Cryptography. 225-244 - Peeter Laud:

Linear-Time Oblivious Permutations for SPDZ. 245-252 - Anaëlle Le Dévéhat

, Hiroki Shizuya, Shingo Hasegawa:
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem. 253-272 - Antonio Faonio

:
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model. 273-291
Attacks and Counter-Measures
- Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi

, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. 295-314 - Julian Fietkau, David Pascal Runge, Jean-Pierre Seifert:

Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services. 315-333 - Nolan Miranda, Foo Yee Yeo, Vipin Singh Sehrawat

:
Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions. 334-354 - Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:

How Distance-Bounding Can Detect Internet Traffic Hijacking. 355-371 - Bojan Novkovic

, Marin Golub
:
SoK: Secure Memory Allocation. 372-391 - Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa:

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training. 392-411 - Markus Dürmuth

, Maximilian Golla
, Philipp Markert
, Alexander May
, Lars Schlieper
:
Towards Quantum Large-Scale Password Guessing on Real-World Distributions. 412-431
Attestation and Verification
- Dmytro Bogatov

, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. 435-459 - Ignacio M. Delgado-Lozano

, Macarena C. Martínez-Rodríguez
, Alexandros Bakas
, Billy Bob Brumley
, Antonis Michalas
:
Attestation Waves: Platform Trust via Remote Power Analysis. 460-482 - Tamara Finogina, Javier Herranz, Enrique Larraia

:
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting. 483-491 - Behzad Abdolmaleki, Daniel Slamanig

:
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs. 492-512 - Pablo Rauzy

, Ali Nehme:
THC: Practical and Cost-Effective Verification of Delegated Computation. 513-530 - Karim Baghery

, Mahdi Sedaghat
:
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. 531-551

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














