


default search action
19th ACNS 2021: Kamakura, Japan - Part I
- Kazue Sako, Nils Ole Tippenhauer

:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12726, Springer 2021, ISBN 978-3-030-78371-6
Cryptographic Protocols
- Ren Ishibashi, Kazuki Yoneyama:

Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles. 3-27 - Long Meng, Liqun Chen

:
Analysis of Client-Side Security for Long-Term Time-Stamping Services. 28-49 - Viet Vo, Shangqi Lai

, Xingliang Yuan, Surya Nepal
, Joseph K. Liu:
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. 50-75
Secure and Fair Protocols
- Yuqi Chen, Xiaoyu Zhang, Yi Xie

, Meixia Miao, Xu Ma:
CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning. 79-99 - Yi Liu

, Qi Wang
, Siu-Ming Yiu:
Blind Polynomial Evaluation and Data Trading. 100-129 - Handan Kilinç Alper, Alptekin Küpçü

:
Coin-Based Multi-party Fair Exchange. 130-160
Cryptocurrency and Smart Contracts
- Carsten Baum

, Bernardo David, Tore Kasper Frederiksen:
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange. 163-194 - David Chaum, Mario Larangeira, Mario Yaksetig, William Carter:

W-OTS+ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets. 195-219 - Gennaro Avitabile

, Daniele Friolo
, Ivan Visconti:
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems. 220-247
Digital Signatures
- Angèle Bossuat, Xavier Bultel:

Unlinkable and Invisible γ-Sanitizable Signatures. 251-283 - Essam Ghadafi:

Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More. 284-312 - Guoqiang Wang, Yanmei Cao:

An Efficient Certificate-Based Signature Scheme in the Standard Model. 313-329
Embedded System Security
- Flavio Toffalini, Mariano Graziano, Mauro Conti

, Jianying Zhou:
SnakeGX: A Sneaky Attack Against SGX Enclaves. 333-362 - Hervé Chabanne

, Jean-Luc Danger, Linda Guiga, Ulrich Kühne:
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks. 363-392 - Kiyofumi Tanaka, Atsuko Miyaji

, Yaoan Jin:
Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems. 393-414
Lattice Cryptography
- Xiuhua Wang, Harry W. H. Wong

, Sherman S. M. Chow
:
Access Control Encryption from Group Encryption. 417-441 - Partha Sarathi Roy

, Sabyasachi Dutta
, Willy Susilo
, Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. 442-459 - Hao Chen, Wei Dai

, Miran Kim
, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. 460-479

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














