


default search action
21st CANS 2022: Dubai, United Arab Emirates
- Alastair R. Beresford
, Arpita Patra
, Emanuele Bellini
:
Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings. Lecture Notes in Computer Science 13641, Springer 2022, ISBN 978-3-031-20973-4
Zero-Knowledge and MPC
- Michele Ciampi
, Ivan Visconti
:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 3-22 - Karim Baghery
, Navid Ghaedi Bardeh
:
Updatable NIZKs from Non-Interactive Zaps. 23-43 - Abdelrahaman Aly
, Kashif Nawaz
, Eugenio Salazar
, Victor Sucasas
:
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's. 44-67
Public-Key Infrastructure
- Sebastian Neef
, Nils Wisiol
:
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. 71-88 - Kwan Yin Chan
, Tsz Hon Yuen
:
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. 89-121 - Antonio Faonio
, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 122-142 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard. 143-164
Attacks and Countermeasures
- Shyam Murthy
, Srinivas Vivek
:
Passive Triangulation Attack on ORide. 167-187 - Musa Sadik Unal, Arsalan Javeed
, Cemal Yilmaz
, Erkay Savas:
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments. 188-199
Cryptanalysis and Provable Security
- Dongdong Lin
, Shaozhen Chen
, Manman Li
, Zezhou Hou
:
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN. 203-224 - Lukasz Krzywiecki
, Hannes Salin
:
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. 225-244 - Didier Alquié, Guy Chassé, Abderrahmane Nitaj:
Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 245-257 - Yuan Gao, Chun Guo:
Provable Security of rmHADES Structure. 258-276
Cryptographic Protocols
- Kalikinkar Mandal
:
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters. 279-291 - Azam Soleimanian:
Anonymous Random Allocation and Its Applications. 292-313 - Luis Adan Saavedra
, Alastair R. Beresford
:
ACDC: Anonymous Crowdsourcing Using Digital Cash. 314-325
Blockchain and Payment Systems
- Ankit Gangwal
, Rahul Valluri, Mauro Conti
:
Analyzing Price Deviations in DeFi Oracles. 329-338 - Thiago Leucz Astrizi
, Ricardo Custódio:
Redacting Blockchain Without Exposing Chameleon Hash Collisions. 339-358
Codes and Post-quantum Cryptography
- Françoise Levy-dit-Vehel, Maxime Roméas:
Efficient Proofs of Retrievability Using Expander Codes. 361-370 - Frederico Schardong
, Alexandre Augusto Giron
, Fernanda Larisa Müller
, Ricardo Custódio
:
Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era. 371-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.