default search action
19th CANS 2020: Vienna, Austria
- Stephan Krenn, Haya Schulmann, Serge Vaudenay:
Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12579, Springer 2020, ISBN 978-3-030-65410-8
Best Papers
- Daniel Kales, Greg Zaverucha:
An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes. 3-22 - Andrea Caforio, Fatih Balli, Subhadeep Banik:
Energy Analysis of Lightweight AEAD Circuits. 23-42 - Bar Meyuhas, Nethanel Gelernter, Amir Herzberg:
Cross-Site Search Attacks: Unauthorized Queries over Private Data. 43-62
Cybersecurity
- Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Stronger Targeted Poisoning Attacks Against Malware Detection. 65-84 - Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep K. Shukla:
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments. 85-106 - Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld:
HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security. 107-126 - P. V. Sai Charan, Sandeep K. Shukla, P. Mohan Anand:
Detecting Word Based DGA Domains Using Ensemble Models. 127-143
Credentials
- Daniel Bosk, Simon Bouget, Sonja Buchegger:
Distance-Bounding, Privacy-Preserving Attribute-Based Credentials. 147-166 - Ruthu Hulikal Rooparaghunath, T. S. Harikrishnan, Debayan Gupta:
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation. 167-187 - Andrea Huszti, Norbert Oláh:
Provably Secure Scalable Distributed Authentication for Clouds. 188-210 - Fynn Dallmeier, Jan Peter Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf:
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. 211-231
Elliptic Curves
- Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart:
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT. 235-258 - Youssef El Housni, Aurore Guillevic:
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition. 259-279 - Rémi Clarisse, Sylvain Duquesne, Olivier Sanders:
Curves with Fast Computations in the First Pairing Group. 280-298 - Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. 299-319
Payment Systems
- Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. 323-343 - Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti:
Detecting Covert Cryptomining Using HPC. 344-364 - Maxim Jourenko, Mario Larangeira, Keisuke Tanaka:
Lightweight Virtual Payment Channels. 365-384
Privacy-Enhancing Tools
- Tapas Pal, Ratna Dutta:
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE. 387-408 - Ferhat Karakoç, Alptekin Küpçü:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. 409-429 - Jayamine Alupotha, Xavier Boyen, Ernest Foo:
Compact Multi-Party Confidential Transactions. 430-452 - Karim Baghery, Zaira Pindado, Carla Ràfols:
Simulation Extractable Versions of Groth's zk-SNARK Revisited. 453-461 - Bernardo David, Rafael Dowsley:
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model. 462-481
Lightweight Cryptography
- Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. 485-504 - Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel:
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation. 505-525 - Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoît Viguier:
Assembly or Optimized C for Lightweight Cryptography on RISC-V? 526-545
Codes and Lattices
- Aurélien Greuet, Simon Montoya, Guénaël Renault:
Attack on LAC Key Exchange in Misuse Situation. 549-569 - Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Víctor Mateu:
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric. 570-592 - Séamus Brannigan, Máire O'Neill, Ayesha Khalid, Ciara Rafferty:
A Secure Algorithm for Rounded Gaussian Sampling. 593-612 - Gyana Sahu, Kurt Rohloff:
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs. 613-632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.