


default search action
21st CANS 2022: Dubai, United Arab Emirates
- Alastair R. Beresford

, Arpita Patra
, Emanuele Bellini
:
Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings. Lecture Notes in Computer Science 13641, Springer 2022, ISBN 978-3-031-20973-4
Zero-Knowledge and MPC
- Michele Ciampi

, Ivan Visconti
:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 3-22 - Karim Baghery

, Navid Ghaedi Bardeh
:
Updatable NIZKs from Non-Interactive Zaps. 23-43 - Abdelrahaman Aly

, Kashif Nawaz
, Eugenio Salazar
, Victor Sucasas
:
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's. 44-67
Public-Key Infrastructure
- Sebastian Neef

, Nils Wisiol
:
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. 71-88 - Kwan Yin Chan

, Tsz Hon Yuen
:
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. 89-121 - Antonio Faonio

, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 122-142 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:

(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard. 143-164
Attacks and Countermeasures
- Shyam Murthy

, Srinivas Vivek
:
Passive Triangulation Attack on ORide. 167-187 - Musa Sadik Unal, Arsalan Javeed

, Cemal Yilmaz
, Erkay Savas:
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments. 188-199
Cryptanalysis and Provable Security
- Dongdong Lin

, Shaozhen Chen
, Manman Li
, Zezhou Hou
:
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN. 203-224 - Lukasz Krzywiecki

, Hannes Salin
:
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. 225-244 - Didier Alquié, Guy Chassé, Abderrahmane Nitaj:

Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 245-257 - Yuan Gao, Chun Guo:

Provable Security of rmHADES Structure. 258-276
Cryptographic Protocols
- Kalikinkar Mandal

:
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters. 279-291 - Azam Soleimanian:

Anonymous Random Allocation and Its Applications. 292-313 - Luis Adan Saavedra

, Alastair R. Beresford
:
ACDC: Anonymous Crowdsourcing Using Digital Cash. 314-325
Blockchain and Payment Systems
- Ankit Gangwal

, Rahul Valluri, Mauro Conti
:
Analyzing Price Deviations in DeFi Oracles. 329-338 - Thiago Leucz Astrizi

, Ricardo Custódio:
Redacting Blockchain Without Exposing Chameleon Hash Collisions. 339-358
Codes and Post-quantum Cryptography
- Françoise Levy-dit-Vehel, Maxime Roméas:

Efficient Proofs of Retrievability Using Expander Codes. 361-370 - Frederico Schardong

, Alexandre Augusto Giron
, Fernanda Larisa Müller
, Ricardo Custódio
:
Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era. 371-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














