ACNS B

30 papers

YearTitle / Authors
2019A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS.
John Henry Castellanos, Jianying Zhou
2019A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups.
Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
2019Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings
Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
2019Benchmarking Privacy Preserving Scientific Operations.
Abdelrahaman Aly, Nigel P. Smart
2019Cryptanalysis of ForkAES.
Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
2019DL-Extractable UC-Commitment Schemes.
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
2019DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia
2019Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates.
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
2019Generic and Practical Key Establishment from Lattice.
Zhengzhong Jin, Yunlei Zhao
2019Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Nils Ole Tippenhauer
2019Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length.
Daniel Gardham, Mark Manulis
2019Homomorphic Training of 30, 000 Logistic Regression Models.
Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
2019Longitudinal Analysis of Misuse of Bitcoin.
Karim Eldefrawy, Ashish Gehani, Alexandre Matton
2019Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
2019Masking Fuzzy-Searchable Public Databases.
Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
2019One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
2019Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
Alexander Moch, Eik List
2019PassGAN: A Deep Learning Approach for Password Guessing.
Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz
2019Password-Authenticated Public-Key Encryption.
Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
2019Proxy Re-Encryption and Re-Signatures from Lattices.
Xiong Fan, Feng-Hao Liu
2019Public Immunization Against Complete Subversion Without Random Oracles.
Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
2019Raptor: A Practical Lattice-Based (Linkable) Ring Signature.
Xingye Lu, Man Ho Au, Zhenfei Zhang
2019Rate-Optimizing Compilers for Continuously Non-malleable Codes.
Sandro Coretti, Antonio Faonio, Daniele Venturi
2019Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk
2019Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures.
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
2019Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu
2019Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing.
Aner Ben-Efraim, Michael Nielsen, Eran Omri
2019Unbounded Inner-Product Functional Encryption with Succinct Keys.
Edouard Dufour Sans, David Pointcheval
2019Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen
2019pRate: Anonymous Star Rating with Rating Secrecy.
Jia Liu, Mark Manulis