ACNS B

45 papers

YearTitle / Authors
2022(Commit-and-Prove) Predictable Arguments with Privacy.
Hamidreza Khoshakhlagh
2022A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
2022A Performance Evaluation of Pairing-Based Broadcast Encryption Systems.
Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
2022A White-Box Speck Implementation Using Self-equivalence Encodings.
Joachim Vandersmissen, Adrián Ranea, Bart Preneel
2022An Approach to Generate Realistic HTTP Parameters for Application Layer Deception.
Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya
2022An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
2022Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2022Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings
Giuseppe Ateniese, Daniele Venturi
2022Astrape: Anonymous Payment Channels with Boring Cryptography.
Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
2022Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
Hosein Hadipour, Maria Eichlseder
2022Babel Fees via Limited Liabilities.
Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova
2022Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
Prakash Shrestha, Nitesh Saxena
2022Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation.
Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2022Carry-Less to BIKE Faster.
Ming-Shing Chen, Tim Güneysu, Markus Krausz, Jan Philipp Thoma
2022Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities.
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2022Covert Authentication from Lattices.
Rajendra Kumar, Khoa Nguyen
2022Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher.
Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek
2022Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow
2022Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp
2022Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
2022Efficient Two-Party Exponentiation from Quotient Transfer.
Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka
2022Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
2022FAST: Fair Auctions via Secret Transactions.
Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
2022Faster Kyber and Dilithium on the Cortex-M4.
Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
2022Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
Zengrui Liu, Prakash Shrestha, Nitesh Saxena
2022How Byzantine is a Send Corruption?
Karim Eldefrawy, Julian Loss, Ben Terner
2022IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun
2022Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter
2022Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64.
Feifan Wang, Gaoli Wang
2022Improving the Privacy of Tor Onion Services.
Edward Eaton, Sajin Sasy, Ian Goldberg
2022KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
2022Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation.
Shingo Sato, Keita Emura, Atsushi Takayasu
2022PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
2022Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes.
Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter
2022Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives.
Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
2022Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators.
Florette Martinez
2022Privacy-Preserving Authenticated Key Exchange for Constrained Devices.
Loïc Ferreira
2022Probing for Passwords - Privacy Implications of SSIDs in Probe Requests.
Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath
2022Progressive and Efficient Verification for Digital Signatures.
Cecilia Boschini, Dario Fiore, Elena Pagnin
2022Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices.
Gustavo Banegas, Koen Zandberg, Emmanuel Baccelli, Adrian Herrmann, Benjamin Smith
2022RSA Key Recovery from Digit Equivalence Information.
Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
2022Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols.
Alisa Pankova, Jan Willemson
2022Revocable Hierarchical Attribute-Based Signatures from Lattices.
Daniel Gardham, Mark Manulis
2022Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy.
S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
2022ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes.
Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan