CANS B

26 papers

YearTitle / Authors
2018Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.
Momonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda
2018Adaptive-Secure VRFs with Shorter Keys from Static Assumptions.
Razvan Rosie
2018Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes.
Paolo Santini, Marco Baldi, Franco Chiaraluce
2018Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project.
Zhen Liu, Yanbin Pan, Tianyuan Xie
2018CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu
2018Code-Based Signature Schemes from Identification Protocols in the Rank Metric.
Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu
2018Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach.
Varsha Bhat Kukkala, S. R. S. Iyengar
2018Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework.
Kamalesh Acharya, Ratna Dutta
2018Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings
Jan Camenisch, Panos Papadimitratos
2018DNS-DNS: DNS-Based De-NAT Scheme.
Liran Orevi, Amir Herzberg, Haim Zlatokrilov
2018Enhanced Security of Attribute-Based Signatures.
Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018Extending a Framework for Biometric Visual Cryptography.
Koray Karabina, Angela Robinson
2018Faster Privacy-Preserving Location Proximity Schemes.
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2018Hierarchical Attribute-Based Signatures.
Constantin Catalin Dragan, Daniel Gardham, Mark Manulis
2018Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption.
Masahito Ishizaka, Kanta Matsuura
2018Inside GandCrab Ransomware.
Yassine Lemmou, El Mamoun Souidi
2018Malware Tolerant (Mesh-)Networks.
Michael Denzel, Mark Dermot Ryan
2018On the Efficiency of ZMAC-Type Modes.
Yusuke Naito
2018Protean Signature Schemes.
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018SETLA: Signature and Encryption from Lattices.
François Gérard, Keno Merckx
2018Secret Sharing Schemes for (k, n)-Consecutive Access Structures.
Javier Herranz, Germán Sáez
2018Several MILP-Aided Attacks Against SNOW 2.0.
Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii
2018Solving LWR via BDD Strategy: Modulus Switching Approach.
Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda
2018The Relation Between CENC and NEMO.
Bart Mennink
2018Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline.
Donald Nokam Kuate, Sébastien Canard, Renaud Sirdey
2018\mathsf HIKE : Walking the Privacy Trail.
Elena Pagnin, Carlo Brunetta, Pablo Picazo-Sanchez