Search dblp for Publications

export results for "toc:db/conf/acns/acns2024-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/AlkadriDP24,
  author       = {Nabil Alkeilani Alkadri and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Practical Lattice-Based Distributed Signatures for a Small Number
                  of Signers},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {376--402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_15},
  doi          = {10.1007/978-3-031-54770-6\_15},
  timestamp    = {Mon, 11 Mar 2024 15:20:49 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AlkadriDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BassoCFKLMS24,
  author       = {Andrea Basso and
                  Mingjie Chen and
                  Tako Boris Fouotsa and
                  P{\'{e}}ter Kutas and
                  Abel Laval and
                  Laurane Marco and
                  Gustave Tchoffo Saah},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Exploring SIDH-Based Signature Parameters},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {432--456},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_17},
  doi          = {10.1007/978-3-031-54770-6\_17},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BassoCFKLMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BemmannBC24,
  author       = {Pascal Bemmann and
                  Sebastian Berndt and
                  Rongmao Chen},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Subversion-Resilient Signatures Without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {351--375},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_14},
  doi          = {10.1007/978-3-031-54770-6\_14},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BemmannBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BergerDK24,
  author       = {Robin Berger and
                  Felix D{\"{o}}rre and
                  Alexander Koch},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Two-Party Decision Tree Training from Updatable Order-Revealing Encryption},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {288--317},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_12},
  doi          = {10.1007/978-3-031-54770-6\_12},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BergerDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BettaleKPV24,
  author       = {Luk Bettale and
                  Delaram Kahrobaei and
                  Ludovic Perret and
                  Javier A. Verbel},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Biscuit: New MPCitH Signature Scheme from Structured Multivariate
                  Polynomials},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {457--486},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_18},
  doi          = {10.1007/978-3-031-54770-6\_18},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BettaleKPV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BrzuskaEP24,
  author       = {Chris Brzuska and
                  Christoph Egger and
                  Kirthivaasan Puniamurthy},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {CryptoZoo: {A} Viewer for Reduction Proofs},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_1},
  doi          = {10.1007/978-3-031-54770-6\_1},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BrzuskaEP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CachetHRF24,
  author       = {Chlo{\'{e}} Cachet and
                  Ariel Hamlin and
                  Maryam Rezapour and
                  Benjamin Fuller},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Upgrading Fuzzy Extractors},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {156--182},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_7},
  doi          = {10.1007/978-3-031-54770-6\_7},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CachetHRF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CarpentHT24,
  author       = {Xavier Carpent and
                  Seoyeon Hwang and
                  Gene Tsudik},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Element Distinctness and Bounded Input Size in Private Set Intersection
                  and Related Protocols},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {26--57},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_2},
  doi          = {10.1007/978-3-031-54770-6\_2},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CarpentHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DoanPP24,
  author       = {Thi Van Thao Doan and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable
                  Elections},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {257--287},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_11},
  doi          = {10.1007/978-3-031-54770-6\_11},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DoanPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Emura24,
  author       = {Keita Emura},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Generic Construction of Forward Secure Public Key Authenticated Encryption
                  with Keyword Search},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_10},
  doi          = {10.1007/978-3-031-54770-6\_10},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/Emura24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Feneuil24,
  author       = {Thibauld Feneuil},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Building MPCitH-Based Signatures from MQ, MinRank, and Rank {SD}},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {403--431},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_16},
  doi          = {10.1007/978-3-031-54770-6\_16},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/Feneuil24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrancatiV24,
  author       = {Danilo Francati and
                  Daniele Venturi},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Non-malleable Fuzzy Extractors},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {135--155},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_6},
  doi          = {10.1007/978-3-031-54770-6\_6},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FrancatiV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrederiksenLMS24,
  author       = {Tore Kasper Frederiksen and
                  Jonas Lindstr{\o}m and
                  Mikkel Wienberg Madsen and
                  Anne Dorte Spangsberg},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {A New Approach to Efficient and Secure Fixed-Point Computation},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {58--87},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_3},
  doi          = {10.1007/978-3-031-54770-6\_3},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FrederiksenLMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiberatiVLCU24,
  author       = {Edoardo Liberati and
                  Alessandro Visintin and
                  Riccardo Lazzeretti and
                  Mauro Conti and
                  A. Selcuk Uluagac},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {X-Lock: {A} Secure XOR-Based Fuzzy Extractor for Resource Constrained
                  Devices},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {183--210},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_8},
  doi          = {10.1007/978-3-031-54770-6\_8},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiberatiVLCU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NaitoSS24,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {{KIVR:} Committing Authenticated Encryption Using Redundancy and Application
                  to GCM, CCM, and More},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {318--347},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_13},
  doi          = {10.1007/978-3-031-54770-6\_13},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/NaitoSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PhalakarnN24,
  author       = {Kittiphop Phalakarn and
                  Toru Nakamura},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Verification Protocol for Stable Matching from Conditional Disclosure
                  of Secrets},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_5},
  doi          = {10.1007/978-3-031-54770-6\_5},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/PhalakarnN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangSLT24,
  author       = {Pengfei Wang and
                  Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Auditable Attribute-Based Credentials Scheme and Its Application in
                  Contact Tracing},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {88--118},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_4},
  doi          = {10.1007/978-3-031-54770-6\_4},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/WangSLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangWZLWB24,
  author       = {Mengyu Zhang and
                  Long Wang and
                  Xiaoping Zhang and
                  Zhuotao Liu and
                  Yisong Wang and
                  Han Bao},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Efficient Clustering on Encrypted Data},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {213--236},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_9},
  doi          = {10.1007/978-3-031-54770-6\_9},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangWZLWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-1,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6},
  doi          = {10.1007/978-3-031-54770-6},
  isbn         = {978-3-031-54769-0},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics