Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2024-1.bht:"
@inproceedings{DBLP:conf/acns/AlkadriDP24, author = {Nabil Alkeilani Alkadri and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Practical Lattice-Based Distributed Signatures for a Small Number of Signers}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {376--402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_15}, doi = {10.1007/978-3-031-54770-6\_15}, timestamp = {Mon, 11 Mar 2024 15:20:49 +0100}, biburl = {https://dblp.org/rec/conf/acns/AlkadriDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BassoCFKLMS24, author = {Andrea Basso and Mingjie Chen and Tako Boris Fouotsa and P{\'{e}}ter Kutas and Abel Laval and Laurane Marco and Gustave Tchoffo Saah}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Exploring SIDH-Based Signature Parameters}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {432--456}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_17}, doi = {10.1007/978-3-031-54770-6\_17}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BassoCFKLMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BemmannBC24, author = {Pascal Bemmann and Sebastian Berndt and Rongmao Chen}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Subversion-Resilient Signatures Without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {351--375}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_14}, doi = {10.1007/978-3-031-54770-6\_14}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BemmannBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BergerDK24, author = {Robin Berger and Felix D{\"{o}}rre and Alexander Koch}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Two-Party Decision Tree Training from Updatable Order-Revealing Encryption}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {288--317}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_12}, doi = {10.1007/978-3-031-54770-6\_12}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BergerDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BettaleKPV24, author = {Luk Bettale and Delaram Kahrobaei and Ludovic Perret and Javier A. Verbel}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {457--486}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_18}, doi = {10.1007/978-3-031-54770-6\_18}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BettaleKPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BrzuskaEP24, author = {Chris Brzuska and Christoph Egger and Kirthivaasan Puniamurthy}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {CryptoZoo: {A} Viewer for Reduction Proofs}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {3--25}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_1}, doi = {10.1007/978-3-031-54770-6\_1}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BrzuskaEP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CachetHRF24, author = {Chlo{\'{e}} Cachet and Ariel Hamlin and Maryam Rezapour and Benjamin Fuller}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Upgrading Fuzzy Extractors}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {156--182}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_7}, doi = {10.1007/978-3-031-54770-6\_7}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CachetHRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CarpentHT24, author = {Xavier Carpent and Seoyeon Hwang and Gene Tsudik}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {26--57}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_2}, doi = {10.1007/978-3-031-54770-6\_2}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CarpentHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DoanPP24, author = {Thi Van Thao Doan and Olivier Pereira and Thomas Peters}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {257--287}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_11}, doi = {10.1007/978-3-031-54770-6\_11}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DoanPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Emura24, author = {Keita Emura}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {237--256}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_10}, doi = {10.1007/978-3-031-54770-6\_10}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/Emura24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Feneuil24, author = {Thibauld Feneuil}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Building MPCitH-Based Signatures from MQ, MinRank, and Rank {SD}}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {403--431}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_16}, doi = {10.1007/978-3-031-54770-6\_16}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/Feneuil24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrancatiV24, author = {Danilo Francati and Daniele Venturi}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Non-malleable Fuzzy Extractors}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {135--155}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_6}, doi = {10.1007/978-3-031-54770-6\_6}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FrancatiV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrederiksenLMS24, author = {Tore Kasper Frederiksen and Jonas Lindstr{\o}m and Mikkel Wienberg Madsen and Anne Dorte Spangsberg}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {A New Approach to Efficient and Secure Fixed-Point Computation}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {58--87}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_3}, doi = {10.1007/978-3-031-54770-6\_3}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/FrederiksenLMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiberatiVLCU24, author = {Edoardo Liberati and Alessandro Visintin and Riccardo Lazzeretti and Mauro Conti and A. Selcuk Uluagac}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {X-Lock: {A} Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {183--210}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_8}, doi = {10.1007/978-3-031-54770-6\_8}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiberatiVLCU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NaitoSS24, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {{KIVR:} Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {318--347}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_13}, doi = {10.1007/978-3-031-54770-6\_13}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/NaitoSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PhalakarnN24, author = {Kittiphop Phalakarn and Toru Nakamura}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Verification Protocol for Stable Matching from Conditional Disclosure of Secrets}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {119--134}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_5}, doi = {10.1007/978-3-031-54770-6\_5}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/PhalakarnN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangSLT24, author = {Pengfei Wang and Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {88--118}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_4}, doi = {10.1007/978-3-031-54770-6\_4}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/WangSLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangWZLWB24, author = {Mengyu Zhang and Long Wang and Xiaoping Zhang and Zhuotao Liu and Yisong Wang and Han Bao}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Efficient Clustering on Encrypted Data}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {213--236}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_9}, doi = {10.1007/978-3-031-54770-6\_9}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ZhangWZLWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-1, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6}, doi = {10.1007/978-3-031-54770-6}, isbn = {978-3-031-54769-0}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.