![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/cans/cans2019.bht:"
@inproceedings{DBLP:conf/cans/ChenC19, author = {Lanxiang Chen and Zhenchao Chen}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {163--183}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_9}, doi = {10.1007/978-3-030-31578-8\_9}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/ChenC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChenLW0X19, author = {Kai Chen and Zhongrui Lin and Jian Wan and Lei Xu and Chungen Xu}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Multi-owner Secure Encrypted Search Using Searching Adversarial Networks}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {184--195}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_10}, doi = {10.1007/978-3-030-31578-8\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChenLW0X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChengYYM19, author = {Yuting Cheng and Li Yang and Shui Yu and Jianfeng Ma}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {392--411}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_22}, doi = {10.1007/978-3-030-31578-8\_22}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/ChengYYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChoiKYMC19, author = {Kyu Young Choi and Eunkyung Kim and Hyo Jin Yoon and Dukjae Moon and Jihoon Cho}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Generic Construction of Bounded-Collusion {IBE} via Table-Based ID-to-Key Map}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {457--469}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_25}, doi = {10.1007/978-3-030-31578-8\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChoiKYMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DattaJF19, author = {Amit Datta and Marc Joye and Nadia Fawaz}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Private Data Aggregation over Selected Subsets of Users}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {375--391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_21}, doi = {10.1007/978-3-030-31578-8\_21}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DattaJF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DesmedtDM19, author = {Yvo Desmedt and Sabyasachi Dutta and Kirill Morozov}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Evolving Perfect Hash Families: {A} Combinatorial Viewpoint of Evolving Secret Sharing}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {291--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_16}, doi = {10.1007/978-3-030-31578-8\_16}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DesmedtDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FerradiN19, author = {Houda Ferradi and David Naccache}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Integer Reconstruction Public-Key Encryption}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {412--433}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_23}, doi = {10.1007/978-3-030-31578-8\_23}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/FerradiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GavinB19, author = {G{\'{e}}rald Gavin and St{\'{e}}phane Bonnevay}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Fractional {LWE:} {A} Nonlinear Variant of {LWE}}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {360--371}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_20}, doi = {10.1007/978-3-030-31578-8\_20}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GavinB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HabockK19, author = {Ulrich Hab{\"{o}}ck and Stephan Krenn}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Breaking and Fixing Anonymous Credentials for the Cloud}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {249--269}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_14}, doi = {10.1007/978-3-030-31578-8\_14}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HabockK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/IzabacheneSZ19, author = {Malika Izabach{\`{e}}ne and Renaud Sirdey and Martin Zuber}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Practical Fully Homomorphic Encryption for Fully Masked Neural Networks}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {24--36}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_2}, doi = {10.1007/978-3-030-31578-8\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/IzabacheneSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KhatibAK19, author = {Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari Kermani}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum Cryptography}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {83--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_5}, doi = {10.1007/978-3-030-31578-8\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KhatibAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LinLWZ19, author = {Fuchun Lin and San Ling and Huaxiong Wang and Neng Zeng}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Threshold Changeable Ramp Secret Sharing}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {308--327}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_17}, doi = {10.1007/978-3-030-31578-8\_17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LinLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MoritaA19, author = {Hiraku Morita and Nuttapong Attrapadung}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Client-Aided Two-Party Secure Interval Test Protocol}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {328--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_18}, doi = {10.1007/978-3-030-31578-8\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/MoritaA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PradhanSMB19, author = {Ankit Pradhan and Kamalakanta Sethi and Shrohan Mohapatra and Padmalochan Bera}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {434--456}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_24}, doi = {10.1007/978-3-030-31578-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PradhanSMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/RatheeSS19, author = {Deevashwer Rathee and Thomas Schneider and K. K. Shukla}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Improved Multiplication Triple Generation over Rings via RLWE-Based {AHE}}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {347--359}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_19}, doi = {10.1007/978-3-030-31578-8\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/RatheeSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SehrawatD19, author = {Vipin Singh Sehrawat and Yvo Desmedt}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {3--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_1}, doi = {10.1007/978-3-030-31578-8\_1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SehrawatD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SeoJA19, author = {Hwajeong Seo and Amir Jalali and Reza Azarderakhsh}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {{SIKE} Round 2 Speed Record on {ARM} Cortex-M4}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {39--60}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_3}, doi = {10.1007/978-3-030-31578-8\_3}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SeoJA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TezukaST19, author = {Masayuki Tezuka and Xiangyu Su and Keisuke Tanaka}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {A t-out-of-n Redactable Signature Scheme}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {470--489}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_26}, doi = {10.1007/978-3-030-31578-8\_26}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/TezukaST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TianLSL019, author = {Yangguang Tian and Yingjiu Li and Binanda Sengupta and Nan Li and Yong Yu}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {512--524}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_28}, doi = {10.1007/978-3-030-31578-8\_28}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/TianLSL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/UnalAP19, author = {Ali Burak {\"{U}}nal and Mete Akg{\"{u}}n and Nico Pfeifer}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {A Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision Medicine}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {493--511}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_27}, doi = {10.1007/978-3-030-31578-8\_27}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/UnalAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangZHWL19, author = {Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {99--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_6}, doi = {10.1007/978-3-030-31578-8\_6}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/WangZHWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WijayaLSLJS19, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu and Fengkie Junis and Dony Ariadi Suwarsono}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Designing Smart Contract for Electronic Document Taxation}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {199--213}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_11}, doi = {10.1007/978-3-030-31578-8\_11}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/WijayaLSLJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WijayaLSLL19, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu and Limerlina}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Senarai: {A} Sustainable Public Blockchain-Based Permanent Storage Protocol}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {235--246}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_13}, doi = {10.1007/978-3-030-31578-8\_13}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/WijayaLSLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XinLSL19, author = {Wenqian Xin and Yunwen Liu and Bing Sun and Chao Li}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Improved Cryptanalysis on SipHash}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {61--79}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_4}, doi = {10.1007/978-3-030-31578-8\_4}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/XinLSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Yuen19, author = {Tsz Hon Yuen}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {PAChain: Private, Authenticated and Auditable Consortium Blockchain}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {214--234}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_12}, doi = {10.1007/978-3-030-31578-8\_12}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/Yuen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangLHZJ19, author = {Yanhua Zhang and Ximeng Liu and Yupu Hu and Qikun Zhang and Huiwen Jia}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {120--140}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_7}, doi = {10.1007/978-3-030-31578-8\_7}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangLHZJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangQMZ19, author = {Meng Zhang and Saiyu Qi and Meixia Miao and Fuyou Zhang}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Enabling Compressed Encryption for Cloud Based Big Data Stores}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {270--287}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_15}, doi = {10.1007/978-3-030-31578-8\_15}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangQMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangWX19, author = {Zhengyu Zhang and Puwen Wei and Haiyang Xue}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {141--160}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_8}, doi = {10.1007/978-3-030-31578-8\_8}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhengH19, author = {Mengce Zheng and Honggang Hu}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Implicit Related-Key Factorization Problem on the {RSA} Cryptosystem}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {525--537}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_29}, doi = {10.1007/978-3-030-31578-8\_29}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/ZhengH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2019, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8}, doi = {10.1007/978-3-030-31578-8}, isbn = {978-3-030-31577-1}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.