Search dblp for Publications

export results for "toc:db/conf/acns/acns2024-2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/0001CLMP024,
  author       = {Elena Andreeva and
                  Beno{\^{\i}}t Cogliati and
                  Virginie Lallemand and
                  Marine Minier and
                  Antoon Purnal and
                  Arnab Roy},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Masked Iterate-Fork-Iterate: {A} New Design Paradigm for Tweakable
                  Expanding Pseudorandom Function},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {433--459},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_17},
  doi          = {10.1007/978-3-031-54773-7\_17},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/0001CLMP024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0003SWH24,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {When and How to Aggregate Message Authentication Codes on Lossy Channels?},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {241--264},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_10},
  doi          = {10.1007/978-3-031-54773-7\_10},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/0003SWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AttrapadungHHK024,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Ryo Hiromasa and
                  Yoshihiro Koseki and
                  Takahiro Matsuda and
                  Yutaro Nishida and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Satoshi Yasuda},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Privacy-Preserving Verifiable CNNs},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_15},
  doi          = {10.1007/978-3-031-54773-7\_15},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AttrapadungHHK024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BelfioreCF24,
  author       = {Roberta Cimorelli Belfiore and
                  Andrea De Cosmo and
                  Anna Lisa Ferrara},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Identity-Based Matchmaking Encryption from Standard Lattice Assumptions},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {163--188},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_7},
  doi          = {10.1007/978-3-031-54773-7\_7},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BelfioreCF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BockBBCPS24,
  author       = {Estuardo Alpirez Bock and
                  Gustavo Banegas and
                  Chris Brzuska and
                  Lukasz Chmielewski and
                  Kirthivaasan Puniamurthy and
                  Milan Sorf},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {101--130},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_5},
  doi          = {10.1007/978-3-031-54773-7\_5},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BockBBCPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BouraDF24,
  author       = {Christina Boura and
                  Patrick Derbez and
                  Margot Funk},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Alternative Key Schedules for the {AES}},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {485--506},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_19},
  doi          = {10.1007/978-3-031-54773-7\_19},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BouraDF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CongEST24,
  author       = {Kelong Cong and
                  Karim Eldefrawy and
                  Nigel P. Smart and
                  Ben Terner},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {The Key Lattice Framework for Concurrent Group Messaging},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {133--162},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_6},
  doi          = {10.1007/978-3-031-54773-7\_6},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CongEST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DobraunigM24,
  author       = {Christoph Dobraunig and
                  Bart Mennink},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Generalized Initialization of the Duplex Construction},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {460--484},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_18},
  doi          = {10.1007/978-3-031-54773-7\_18},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DobraunigM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DowerahM24,
  author       = {Uddipana Dowerah and
                  Aikaterini Mitrokotsa},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Decentralized Private Stream Aggregation from Lattices},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {189--214},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_8},
  doi          = {10.1007/978-3-031-54773-7\_8},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DowerahM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FanXG24,
  author       = {Yongming Fan and
                  Yuquan Xu and
                  Christina Garman},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {340--372},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_14},
  doi          = {10.1007/978-3-031-54773-7\_14},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/FanXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GironSPCVM24,
  author       = {Alexandre Augusto Giron and
                  Frederico Schardong and
                  Lucas Pandolfo Perin and
                  Ricardo Cust{\'{o}}dio and
                  Victor Valle and
                  V{\'{\i}}ctor Mateu},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Automated Issuance of Post-Quantum Certificates: {A} New Challenge},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_1},
  doi          = {10.1007/978-3-031-54773-7\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GironSPCVM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HwangLY24,
  author       = {Vincent Hwang and
                  Chi{-}Ting Liu and
                  Bo{-}Yin Yang},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Algorithmic Views of Vectorized Polynomial Multipliers - {NTRU} Prime},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {24--46},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_2},
  doi          = {10.1007/978-3-031-54773-7\_2},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HwangLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KwakLSW24,
  author       = {Hyesun Kwak and
                  Dongwon Lee and
                  Yongsoo Song and
                  Sameer Wagh},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {A General Framework of Homomorphic Encryption for Multiple Parties
                  with Non-interactive Key-Aggregation},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {403--430},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_16},
  doi          = {10.1007/978-3-031-54773-7\_16},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KwakLSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LingYZZXCZ24,
  author       = {Xi Ling and
                  Jiongchi Yu and
                  Ziming Zhao and
                  Zhihao Zhou and
                  Haitao Xu and
                  Binbin Chen and
                  Fan Zhang},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {DDoSMiner: An Automated Framework for DDoS Attack Characterization
                  and Vulnerability Mining},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {283--309},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_12},
  doi          = {10.1007/978-3-031-54773-7\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LingYZZXCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuDSZZ24,
  author       = {Tianbo Lu and
                  Xia Ding and
                  Jiaze Shang and
                  Pengfei Zhao and
                  Han Zhang},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {DoSat: {A} DDoS Attack on the Vulnerable Time-Varying Topology of
                  {LEO} Satellite Networks},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {265--282},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_11},
  doi          = {10.1007/978-3-031-54773-7\_11},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuDSZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PodschwadtGGT24,
  author       = {Robert Podschwadt and
                  Parsa Ghazvinian and
                  Mohammad GhasemiGol and
                  Daniel Takabi},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {313--339},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_13},
  doi          = {10.1007/978-3-031-54773-7\_13},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/PodschwadtGGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SinhaPM24,
  author       = {Sayani Sinha and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Efficient Quantum-Safe Distributed {PRF} and Applications: Playing
                  DiSE in a Quantum World},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {47--78},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_3},
  doi          = {10.1007/978-3-031-54773-7\_3},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/SinhaPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TaguchiT24,
  author       = {Ren Taguchi and
                  Atsushi Takayasu},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {On the Untapped Potential of the Quantum FLT-Based Inversion},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {79--100},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_4},
  doi          = {10.1007/978-3-031-54773-7\_4},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TaguchiT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/VanhoefR24,
  author       = {Mathy Vanhoef and
                  Jeroen Robben},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {A Security Analysis of {WPA3-PK:} Implementation and Precomputation
                  Attacks},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {217--240},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_9},
  doi          = {10.1007/978-3-031-54773-7\_9},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/VanhoefR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-2,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7},
  doi          = {10.1007/978-3-031-54773-7},
  isbn         = {978-3-031-54772-0},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics