![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
21st ACNS 2023: Kyoto, Japan - Part II
- Mehdi Tibouchi
, Xiaofeng Wang
:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13906, Springer 2023, ISBN 978-3-031-33490-0
Embedded Security
- Elena Andreeva
, Andreas Weninger:
A Forkcipher-Based Pseudo-Random Number Generator. 3-31 - Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi:
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access. 32-61 - Florian Stolz
, Marc Fyrbiak
, Pascal Sasdrich
, Tim Güneysu
:
Recommendation for a Holistic Secure Embedded ISA Extension. 62-84 - Dustin Kern
, Christoph Krauß
, Timm Lauser
, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. 85-111
Privacy-Preserving Protocols
- Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities. 115-142 - Yaxi Yang, Jian Weng
, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. 143-166 - Johannes Ernst
, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption. 167-196 - Pengzhen Ke, Liang Feng Zhang:
Private Information Retrieval with Result Verification for More Servers. 197-216
Isogeny-Based Cryptography
- Shahla Atapoor
, Karim Baghery
, Daniele Cozzo, Robi Pedersen
:
Practical Robust DKG Protocols for CSIDH. 219-247 - Kelong Cong
, Yi-Fu Lai
, Shai Levin
:
Efficient Isogeny Proofs Using Generic Techniques. 248-275 - Jesús-Javier Chi-Domínguez
, Andre Esser
, Sabrina Kunzweiler
, Alexander May
:
Low Memory Attacks on Small Key CSIDH. 276-304
Encryption
- Daniele Friolo
, Matteo Salvino, Daniele Venturi:
On the Complete Non-malleability of the Fujisaki-Okamoto Transform. 307-335 - Ky Nguyen
, Duong Hieu Phan
, David Pointcheval
:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. 336-365 - Huangting Wu, Sherman S. M. Chow
:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. 366-395 - Vlasis Koutsos, Dimitrios Papadopoulos:
Publicly Auditable Functional Encryption. 396-425
Advanced Primitives
- Amit Deo, Charlie Grover:
Robustly Reusable Fuzzy Extractors in a Post-quantum World. 429-459 - Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth
, Tibor Jager:
Subversion-Resilient Authenticated Encryption Without Random Oracles. 460-483 - Sherman S. M. Chow
, Jack P. K. Ma, Tsz Hon Yuen
:
Scored Anonymous Credentials. 484-515 - Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. 516-538
Multiparty Computation
- Keitaro Hiwatashi, Koji Nuida
:
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS. 541-554 - Michele Ciampi
, Yu Xia
:
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions. 555-581 - T.-H. Hubert Chan
, Ting Wen, Hao Xie
, Quan Xue:
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem. 582-610 - Anasuya Acharya, Tomer Ashur
, Efrat Cohen, Carmit Hazay, Avishay Yanai:
A New Approach to Garbled Circuits. 611-641
Blockchain
- Ignacio Cascudo
, Bernardo David, Omer Shlomovits, Denis Varlakov:
Mt. Random: Multi-tiered Randomness Beacons. 645-674 - Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust:
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era. 675-698 - I Wayan Budi Sentana
, Muhammad Ikram
, Mohamed Ali Kâafar
:
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. 699-725
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.