researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Meta-Environment
analysis
data-flow
design
discovery
e-science
meta-model
mobile
modeling
open-source
p2p
protocol
reputation
rule-based
search
security
source-to-source
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Abdelrahaman Aly
Adrian Perrig
Amir Herzberg
Aysajan Abidin
Bart Mennink
Bart Preneel
Bing Sun
C. Pandu Rangan
Chao Li
Dengguo Feng
Huaxiong Wang
Mark Manulis
Reihaneh Safavi-Naini
Serge Vaudenay
Stephan Krenn
Sébastien Canard
Tsz Hon Yuen
Willy Susilo
Yi Mu
Zhenfu Cao
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
authentication
cans
conference
cryptanalysis
cryptology
data
efficient
encryption
key
multi
network
privacy
protocol
secure
security
signatures
using
CANS (cans)
Editions
Publications
Viewing Publication 1 - 100 from 516
2023
Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings
Jing Deng 0001
,
Vladimir Kolesnikov
,
Alexander A. Schwarzmann
, editors,
Volume 14342 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives
Emanuele Bellini 0002
,
Alessandro De Piccoli
,
Mattia Formenti
,
David Gérault
,
Paul Huynh
,
Simone Pelizzola
,
Sergio Polese
,
Andrea Visconti
.
cans 2023
:
268-292
[doi]
Traceable Policy-Based Signatures with Delegation
Ismail Afia
,
Riham AlTawy
.
cans 2023
:
51-72
[doi]
Hardness of Learning AES with Gradient-Based Methods
Kanat Alimanov
,
Zhenisbek Assylbekov
.
cans 2023
:
126-133
[doi]
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE
Yoshinori Aono
,
Junji Shikata
.
cans 2023
:
28-50
[doi]
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets
Saikrishna Badrinarayanan
,
Ranjit Kumaresan
,
Mihai Christodorescu
,
Vinjith Nagaraja
,
Karan Patel
,
Srinivasan Raghuraman
,
Peter Rindal
,
Wei Sun
,
Minghua Xu 0003
.
cans 2023
:
443-467
[doi]
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
Anaïs Barthoulot
,
Olivier Blazy
,
Sébastien Canard
.
cans 2023
:
538-562
[doi]
Forward Security Under Leakage Resilience, Revisited
Suvradip Chakraborty
,
Harish Karthikeyan
,
Adam O'Neill
,
C. Pandu Rangan
.
cans 2023
:
3-27
[doi]
Privacy-Preserving Digital Vaccine Passport
Thai Duong
,
Jiahui Gao
,
Duong Hieu Phan
,
Ni Trieu
.
cans 2023
:
137-161
[doi]
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing
Sabyasachi Dutta
,
Shaoquan Jiang
,
Reihaneh Safavi-Naini
.
cans 2023
:
468-493
[doi]
Key Filtering in Cube Attacks from the Implementation Aspect
Hao Fan
,
Yonglin Hao
,
Qingju Wang 0001
,
Xinxin Gong
,
Lin Jiao
.
cans 2023
:
293-317
[doi]
LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness
Sivanarayana Gaddam
,
Ranjit Kumaresan
,
Srinivasan Raghuraman
,
Rohit Sinha 0001
.
cans 2023
:
343-367
[doi]
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium
Timo Glaser
,
Alexander May 0001
.
cans 2023
:
75-100
[doi]
Exploiting Android Browser
Animesh Kar
,
Natalia Stakhanova
.
cans 2023
:
162-185
[doi]
A Practical Forward-Secure DualRing
Nan Li
,
Yingjiu Li
,
Atsuko Miyaji
,
Yangguang Tian
,
Tsz Hon Yuen
.
cans 2023
:
516-537
[doi]
Free-XOR in Card-Based Garbled Circuits
Yoshifumi Manabe
,
Kazumasa Shinagawa
.
cans 2023
:
232-248
[doi]
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal
John Preuß Mattsson
.
cans 2023
:
251-267
[doi]
Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners
Torsha Mazumdar
,
Daniel Timko
,
Muhammad Lutfor Rahman
.
cans 2023
:
186-207
[doi]
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties
Hideaki Miyaji
,
Atsuko Miyaji
.
cans 2023
:
497-515
[doi]
New Techniques for Modeling SBoxes: An MILP Approach
Debranjan Pal
,
Vishal Pankaj Chandratreya
,
Dipanwita Roy Chowdhury
.
cans 2023
:
318-340
[doi]
A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators
Razvan Rosie
.
cans 2023
:
563-587
[doi]
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys
Surbhi Shaw
,
Ratna Dutta
.
cans 2023
:
392-413
[doi]
CTA: Confidential Transactions Protocol with State Accumulator
Shumin Si
,
Puwen Wei
,
Xiuhan Lin
,
Li Liu
.
cans 2023
:
414-439
[doi]
Improving Privacy of Anonymous Proof-of-Stake Protocols
Shichen Wu
,
Zhiying Song
,
Puwen Wei
,
Peng Tang
,
Quan Yuan
.
cans 2023
:
368-391
[doi]
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols
Takuto Yoshida
,
Kodai Tanaka
,
Keisuke Nakabayashi
,
Eikoh Chida
,
Takaaki Mizuki
.
cans 2023
:
211-231
[doi]
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks
Yuqing Zhao
,
Chun Guo 0002
,
Weijia Wang 0003
.
cans 2023
:
101-125
[doi]
2022
Cryptanalysis of the Multi-Power RSA Cryptosystem Variant
Didier Alquié
,
Guy Chassé
,
Abderrahmane Nitaj
.
cans 2022
:
245-257
[doi]
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's
Abdelrahaman Aly
,
Kashif Nawaz
,
Eugenio Salazar
,
Victor Sucasas
.
cans 2022
:
44-67
[doi]
Redacting Blockchain Without Exposing Chameleon Hash Collisions
Thiago Leucz Astrizi
,
Ricardo Custódio
.
cans 2022
:
339-358
[doi]
Updatable NIZKs from Non-Interactive Zaps
Karim Baghery
,
Navid Ghaedi Bardeh
.
cans 2022
:
23-43
[doi]
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
Anaïs Barthoulot
,
Olivier Blazy
,
Sébastien Canard
.
cans 2022
:
143-164
[doi]
Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings
Alastair R. Beresford
,
Arpita Patra
,
Emanuele Bellini 0002
, editors,
Volume 13641 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use
Kwan Yin Chan
,
Tsz Hon Yuen
.
cans 2022
:
89-121
[doi]
Efficient NIZK Arguments with Straight-Line Simulation and Extraction
Michele Ciampi
,
Ivan Visconti
.
cans 2022
:
3-22
[doi]
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio
,
María Isabel González Vasco
,
Claudio Soriente
,
Hien Thi Thu Truong
.
cans 2022
:
122-142
[doi]
Analyzing Price Deviations in DeFi Oracles
Ankit Gangwal
,
Rahul Valluri
,
Mauro Conti
.
cans 2022
:
329-338
[doi]
Provable Security of rmHADES Structure
Yuan Gao
,
Chun Guo 0008
.
cans 2022
:
258-276
[doi]
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh
Lukasz Krzywiecki
,
Hannes Salin
.
cans 2022
:
225-244
[doi]
Efficient Proofs of Retrievability Using Expander Codes
Françoise Levy-dit-Vehel
,
Maxime Roméas
.
cans 2022
:
361-370
[doi]
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN
Dongdong Lin
,
Shaozhen Chen
,
Manman Li
,
Zezhou Hou
.
cans 2022
:
203-224
[doi]
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters
Kalikinkar Mandal
.
cans 2022
:
279-291
[doi]
Passive Triangulation Attack on ORide
Shyam Murthy
,
Srinivas Vivek 0001
.
cans 2022
:
167-187
[doi]
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS
Sebastian Neef
,
Nils Wisiol
.
cans 2022
:
71-88
[doi]
ACDC: Anonymous Crowdsourcing Using Digital Cash
Luis A. Saavedra
,
Alastair R. Beresford
.
cans 2022
:
314-325
[doi]
Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era
Frederico Schardong
,
Alexandre Augusto Giron
,
Fernanda Larisa Müller
,
Ricardo Custódio
.
cans 2022
:
371-390
[doi]
Anonymous Random Allocation and Its Applications
Azam Soleimanian
.
cans 2022
:
292-313
[doi]
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments
Musa Sadik Unal
,
Arsalan Javeed
,
Cemal Yilmaz
,
Erkay Savas
.
cans 2022
:
188-199
[doi]
2021
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services
Julian Fietkau 0002
,
David Pascal Runge
,
Jean-Pierre Seifert
.
cans 2021
:
315-333
[doi]
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs
Behzad Abdolmaleki
,
Daniel Slamanig
.
cans 2021
:
492-512
[doi]
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri
,
Patrick Harasser
,
Christian Janson
.
cans 2021
:
95-115
[doi]
How Distance-Bounding Can Detect Internet Traffic Hijacking
Ghada Arfaoui
,
Gildas Avoine
,
Olivier Gimenez
,
Jacques Traoré
.
cans 2021
:
355-371
[doi]
Partition Oracles from Weak Key Forgeries
Marcel Armour
,
Carlos Cid
.
cans 2021
:
42-62
[doi]
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery
,
Mahdi Sedaghat
.
cans 2021
:
531-551
[doi]
Issuer-Hiding Attribute-Based Credentials
Jan Bobolz
,
Fabian Eidens
,
Stephan Krenn
,
Sebastian Ramacher
,
Kai Samelin
.
cans 2021
:
158-178
[doi]
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov
,
Angelo De Caro
,
Kaoutar Elkhiyaoui
,
Björn Tackmann
.
cans 2021
:
435-459
[doi]
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos
,
Maximilian Ofner
,
Joost Renes
,
Tobias Schneider 0002
,
Christine van Vredendaal
.
cans 2021
:
72-91
[doi]
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings
Mauro Conti
,
Marc Stevens 0001
,
Stephan Krenn
, editors,
Volume 13099 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Attestation Waves: Platform Trust via Remote Power Analysis
Ignacio M. Delgado-Lozano
,
Macarena C. Martínez-Rodríguez
,
Alexandros Bakas
,
Billy Bob Brumley
,
Antonis Michalas
.
cans 2021
:
460-482
[doi]
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat
,
Hiroki Shizuya
,
Shingo Hasegawa
.
cans 2021
:
253-272
[doi]
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth
,
Maximilian Golla
,
Philipp Markert
,
Alexander May 0001
,
Lars Schlieper
.
cans 2021
:
412-431
[doi]
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
.
cans 2021
:
273-291
[doi]
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting
Tamara Finogina
,
Javier Herranz
,
Enrique Larraia
.
cans 2021
:
483-491
[doi]
Report and Trace Ring Signatures
Ashley Fraser
,
Elizabeth A. Quaglia
.
cans 2021
:
179-199
[doi]
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability
Ashley Fraser
,
Lydia Garms
,
Anja Lehmann
.
cans 2021
:
200-221
[doi]
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
Kento Hasegawa
,
Seira Hidano
,
Shinsaku Kiyomoto
,
Nozomu Togawa
.
cans 2021
:
392-411
[doi]
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell
,
Thomas Johansson 0001
,
Alexander Maximov
,
Willi Meier
,
Hirotaka Yoshida
.
cans 2021
:
24-41
[doi]
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan
,
Serge Vaudenay
.
cans 2021
:
225-244
[doi]
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption
Alberto Ibarrondo
,
Hervé Chabanne
,
Melek Önen
.
cans 2021
:
63-71
[doi]
Linear-Time Oblivious Permutations for SPDZ
Peeter Laud
.
cans 2021
:
245-252
[doi]
Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
Nolan Miranda
,
Foo Yee Yeo
,
Vipin Singh Sehrawat
.
cans 2021
:
334-354
[doi]
Countermeasures Against Backdoor Attacks Towards Malware Detectors
Shintaro Narisada
,
Yuki Matsumoto
,
Seira Hidano
,
Toshihiro Uchibayashi
,
Takuo Suganuma
,
Masahiro Hiji
,
Shinsaku Kiyomoto
.
cans 2021
:
295-314
[doi]
SoK: Secure Memory Allocation
Bojan Novkovic
,
Marin Golub
.
cans 2021
:
372-391
[doi]
Efficient Threshold-Optimal ECDSA
Michaella Pettit
.
cans 2021
:
116-135
[doi]
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy
,
Ali Nehme
.
cans 2021
:
513-530
[doi]
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat
,
Bart Preneel
.
cans 2021
:
3-23
[doi]
MT: A Revocable Group Merkle Multi-tree Signature Scheme
Mahmoud Yehia
,
Riham AlTawy
,
T. Aaron Gulliver
.
cans 2021
:
136-157
[doi]
2020
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric
Emanuele Bellini 0002
,
Philippe Gaborit
,
Alexandros Hasikos
,
Víctor Mateu
.
cans 2020
:
570-592
[doi]
Compact Multi-Party Confidential Transactions
Jayamine Alupotha
,
Xavier Boyen
,
Ernest Foo
.
cans 2020
:
430-452
[doi]
Simulation Extractable Versions of Groth's zk-SNARK Revisited
Karim Baghery
,
Zaira Pindado
,
Carla Ràfols
.
cans 2020
:
453-461
[doi]
Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
Daniel Bosk
,
Simon Bouget
,
Sonja Buchegger
.
cans 2020
:
147-166
[doi]
A Secure Algorithm for Rounded Gaussian Sampling
Séamus Brannigan
,
Máire O'Neill
,
Ayesha Khalid
,
Ciara Rafferty
.
cans 2020
:
593-612
[doi]
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio
,
Fatih Balli
,
Subhadeep Banik
.
cans 2020
:
23-42
[doi]
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos
,
Lars Jellema
,
Mauk Lemmen
,
Lars Müller 0006
,
Daan Sprenkels
,
Benoît Viguier
.
cans 2020
:
526-545
[doi]
Detecting Word Based DGA Domains Using Ensemble Models
P. V. Sai Charan
,
Sandeep K. Shukla
,
P. Mohan Anand
.
cans 2020
:
127-143
[doi]
Curves with Fast Computations in the First Pairing Group
Rémi Clarisse
,
Sylvain Duquesne
,
Olivier Sanders
.
cans 2020
:
280-298
[doi]
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David
,
Rafael Dowsley
.
cans 2020
:
462-481
[doi]
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
Cyprien Delpech de Saint Guilhem
,
Emmanuela Orsini
,
Christophe Petit
,
Nigel P. Smart
.
cans 2020
:
235-258
[doi]
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh
,
Amr M. Youssef
.
cans 2020
:
485-504
[doi]
Attack on LAC Key Exchange in Misuse Situation
Aurélien Greuet
,
Simon Montoya
,
Guénaël Renault
.
cans 2020
:
549-569
[doi]
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition
Youssef El Housni
,
Aurore Guillevic
.
cans 2020
:
259-279
[doi]
Provably Secure Scalable Distributed Authentication for Clouds
Andrea Huszti
,
Norbert Oláh
.
cans 2020
:
188-210
[doi]
An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
Daniel Kales
,
Greg Zaverucha
.
cans 2020
:
3-22
[doi]
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç
,
Alptekin Küpçü
.
cans 2020
:
409-429
[doi]
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
Saurabh Kumar
,
Debadatta Mishra
,
Biswabandan Panda
,
Sandeep K. Shukla
.
cans 2020
:
85-106
[doi]
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio
,
Danilo Francati
,
Giuseppe Ateniese
.
cans 2020
:
323-343
[doi]
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Heiko Mantel
,
Lukas Scheidel
,
Thomas Schneider
,
Alexandra Weber
,
Christian Weinert
,
Tim Weißmantel
.
cans 2020
:
505-525
[doi]
Cross-Site Search Attacks: Unauthorized Queries over Private Data
Bar Meyuhas
,
Nethanel Gelernter
,
Amir Herzberg
.
cans 2020
:
43-62
[doi]
HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security
Pablo Picazo-Sanchez
,
Gerardo Schneider 0003
,
Andrei Sabelfeld
.
cans 2020
:
107-126
[doi]
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
Ruthu Hulikal Rooparaghunath
,
T. S. Harikrishnan
,
Debayan Gupta
.
cans 2020
:
167-187
[doi]
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
Gyana Sahu
,
Kurt Rohloff
.
cans 2020
:
613-632
[doi]
Sign in
or
sign up
to see more results.