CANS B

31 papers

YearTitle / Authors
2020A Secure Algorithm for Rounded Gaussian Sampling.
Séamus Brannigan, Máire O'Neill, Ayesha Khalid, Ciara Rafferty
2020Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs.
Gyana Sahu, Kurt Rohloff
2020An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes.
Daniel Kales, Greg Zaverucha
2020Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains.
Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
2020Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoît Viguier
2020Attack on LAC Key Exchange in Misuse Situation.
Aurélien Greuet, Simon Montoya, Guénaël Renault
2020Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE.
Tapas Pal, Ratna Dutta
2020Compact Multi-Party Confidential Transactions.
Jayamine Alupotha, Xavier Boyen, Ernest Foo
2020Cross-Site Search Attacks: Unauthorized Queries over Private Data.
Bar Meyuhas, Nethanel Gelernter, Amir Herzberg
2020Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings
Stephan Krenn, Haya Schulmann, Serge Vaudenay
2020Curves with Fast Computations in the First Pairing Group.
Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
2020Detecting Covert Cryptomining Using HPC.
Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti
2020Detecting Word Based DGA Domains Using Ensemble Models.
P. V. Sai Charan, Sandeep K. Shukla, P. Mohan Anand
2020Distance-Bounding, Privacy-Preserving Attribute-Based Credentials.
Daniel Bosk, Simon Bouget, Sonja Buchegger
2020Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model.
Bernardo David, Rafael Dowsley
2020Energy Analysis of Lightweight AEAD Circuits.
Andrea Caforio, Fatih Balli, Subhadeep Banik
2020Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric.
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Víctor Mateu
2020Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.
Fynn Dallmeier, Jan Peter Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
2020HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security.
Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld
2020Integral Cryptanalysis of Reduced-Round Tweakable TWINE.
Muhammad ElSheikh, Amr M. Youssef
2020Lightweight Virtual Payment Channels.
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020Linear Complexity Private Set Intersection for Secure Two-Party Protocols.
Ferhat Karakoç, Alptekin Küpçü
2020Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition.
Youssef El Housni, Aurore Guillevic
2020Provably Secure Scalable Distributed Authentication for Clouds.
Andrea Huszti, Norbert Oláh
2020Revisiting ECM on GPUs.
Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
2020RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel
2020STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments.
Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep K. Shukla
2020Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
2020Simulation Extractable Versions of Groth's zk-SNARK Revisited.
Karim Baghery, Zaira Pindado, Carla Ràfols
2020Stronger Targeted Poisoning Attacks Against Malware Detection.
Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto
2020Trenchcoat: Human-Computable Hashing Algorithms for Password Generation.
Ruthu Hulikal Rooparaghunath, T. S. Harikrishnan, Debayan Gupta