Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2024-2.bht:"
@inproceedings{DBLP:conf/acns/0001CLMP024, author = {Elena Andreeva and Beno{\^{\i}}t Cogliati and Virginie Lallemand and Marine Minier and Antoon Purnal and Arnab Roy}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Masked Iterate-Fork-Iterate: {A} New Design Paradigm for Tweakable Expanding Pseudorandom Function}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {433--459}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_17}, doi = {10.1007/978-3-031-54773-7\_17}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/0001CLMP024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0003SWH24, author = {Eric Wagner and Martin Serror and Klaus Wehrle and Martin Henze}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {When and How to Aggregate Message Authentication Codes on Lossy Channels?}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {241--264}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_10}, doi = {10.1007/978-3-031-54773-7\_10}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/0003SWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AttrapadungHHK024, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Ryo Hiromasa and Yoshihiro Koseki and Takahiro Matsuda and Yutaro Nishida and Yusuke Sakai and Jacob C. N. Schuldt and Satoshi Yasuda}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Privacy-Preserving Verifiable CNNs}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {373--402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_15}, doi = {10.1007/978-3-031-54773-7\_15}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AttrapadungHHK024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BelfioreCF24, author = {Roberta Cimorelli Belfiore and Andrea De Cosmo and Anna Lisa Ferrara}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Identity-Based Matchmaking Encryption from Standard Lattice Assumptions}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {163--188}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_7}, doi = {10.1007/978-3-031-54773-7\_7}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BelfioreCF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BockBBCPS24, author = {Estuardo Alpirez Bock and Gustavo Banegas and Chris Brzuska and Lukasz Chmielewski and Kirthivaasan Puniamurthy and Milan Sorf}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {101--130}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_5}, doi = {10.1007/978-3-031-54773-7\_5}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BockBBCPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BouraDF24, author = {Christina Boura and Patrick Derbez and Margot Funk}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Alternative Key Schedules for the {AES}}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {485--506}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_19}, doi = {10.1007/978-3-031-54773-7\_19}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BouraDF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CongEST24, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart and Ben Terner}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {The Key Lattice Framework for Concurrent Group Messaging}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {133--162}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_6}, doi = {10.1007/978-3-031-54773-7\_6}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CongEST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DobraunigM24, author = {Christoph Dobraunig and Bart Mennink}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Generalized Initialization of the Duplex Construction}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {460--484}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_18}, doi = {10.1007/978-3-031-54773-7\_18}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DobraunigM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DowerahM24, author = {Uddipana Dowerah and Aikaterini Mitrokotsa}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Decentralized Private Stream Aggregation from Lattices}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {189--214}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_8}, doi = {10.1007/978-3-031-54773-7\_8}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DowerahM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FanXG24, author = {Yongming Fan and Yuquan Xu and Christina Garman}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {340--372}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_14}, doi = {10.1007/978-3-031-54773-7\_14}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FanXG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GironSPCVM24, author = {Alexandre Augusto Giron and Frederico Schardong and Lucas Pandolfo Perin and Ricardo Cust{\'{o}}dio and Victor Valle and V{\'{\i}}ctor Mateu}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Automated Issuance of Post-Quantum Certificates: {A} New Challenge}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {3--23}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_1}, doi = {10.1007/978-3-031-54773-7\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GironSPCVM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HwangLY24, author = {Vincent Hwang and Chi{-}Ting Liu and Bo{-}Yin Yang}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Algorithmic Views of Vectorized Polynomial Multipliers - {NTRU} Prime}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {24--46}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_2}, doi = {10.1007/978-3-031-54773-7\_2}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HwangLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KwakLSW24, author = {Hyesun Kwak and Dongwon Lee and Yongsoo Song and Sameer Wagh}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {403--430}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_16}, doi = {10.1007/978-3-031-54773-7\_16}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KwakLSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LingYZZXCZ24, author = {Xi Ling and Jiongchi Yu and Ziming Zhao and Zhihao Zhou and Haitao Xu and Binbin Chen and Fan Zhang}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {283--309}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_12}, doi = {10.1007/978-3-031-54773-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LingYZZXCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuDSZZ24, author = {Tianbo Lu and Xia Ding and Jiaze Shang and Pengfei Zhao and Han Zhang}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {DoSat: {A} DDoS Attack on the Vulnerable Time-Varying Topology of {LEO} Satellite Networks}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {265--282}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_11}, doi = {10.1007/978-3-031-54773-7\_11}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuDSZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PodschwadtGGT24, author = {Robert Podschwadt and Parsa Ghazvinian and Mohammad GhasemiGol and Daniel Takabi}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {313--339}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_13}, doi = {10.1007/978-3-031-54773-7\_13}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/PodschwadtGGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SinhaPM24, author = {Sayani Sinha and Sikhar Patranabis and Debdeep Mukhopadhyay}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Efficient Quantum-Safe Distributed {PRF} and Applications: Playing DiSE in a Quantum World}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {47--78}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_3}, doi = {10.1007/978-3-031-54773-7\_3}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/SinhaPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TaguchiT24, author = {Ren Taguchi and Atsushi Takayasu}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {On the Untapped Potential of the Quantum FLT-Based Inversion}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {79--100}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_4}, doi = {10.1007/978-3-031-54773-7\_4}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TaguchiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VanhoefR24, author = {Mathy Vanhoef and Jeroen Robben}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {A Security Analysis of {WPA3-PK:} Implementation and Precomputation Attacks}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {217--240}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_9}, doi = {10.1007/978-3-031-54773-7\_9}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/VanhoefR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-2, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7}, doi = {10.1007/978-3-031-54773-7}, isbn = {978-3-031-54772-0}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.