CANS B

26 papers

YearTitle / Authors
2023A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
Razvan Rosie
2023A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets.
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
2023A Practical Forward-Secure DualRing.
Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
2023Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE.
Yoshinori Aono, Junji Shikata
2023Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.
Torsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman
2023CTA: Confidential Transactions Protocol with State Accumulator.
Shumin Si, Puwen Wei, Xiuhan Lin, Li Liu
2023Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys.
Surbhi Shaw, Ratna Dutta
2023Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings
Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
2023Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives.
Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti
2023Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.
Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2023Exploiting Android Browser.
Animesh Kar, Natalia Stakhanova
2023Forward Security Under Leakage Resilience, Revisited.
Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan
2023Free-XOR in Card-Based Garbled Circuits.
Yoshifumi Manabe, Kazumasa Shinagawa
2023Hardness of Learning AES with Gradient-Based Methods.
Kanat Alimanov, Zhenisbek Assylbekov
2023Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.
John Preuß Mattsson
2023How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.
Timo Glaser, Alexander May
2023Improving Privacy of Anonymous Proof-of-Stake Protocols.
Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan
2023Key Filtering in Cube Attacks from the Implementation Aspect.
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao
2023Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties.
Hideaki Miyaji, Atsuko Miyaji
2023Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini
2023LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness.
Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
2023New Techniques for Modeling SBoxes: An MILP Approach.
Debranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury
2023Privacy-Preserving Digital Vaccine Passport.
Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu
2023Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.
Yuqing Zhao, Chun Guo, Weijia Wang
2023Traceable Policy-Based Signatures with Delegation.
Ismail Afia, Riham AlTawy
2023Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols.
Takuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, Takaaki Mizuki