


default search action
23rd CANS 2024: Cambridge, UK - Part II
- Markulf Kohlweiss
, Roberto Di Pietro
, Alastair R. Beresford
:
Cryptology and Network Security - 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14906, Springer 2025, ISBN 978-981-97-8015-0
Cyber Security and Leakage
- Beatrice Perez, Abhinav Mehrotra, Mirco Musolesi:
MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile Devices. 3-24 - Iliana Fayolle
, Jan Wichelmann
, Anja Köhl, Walter Rudametkin
, Thomas Eisenbarth
, Clémentine Maurice
:
Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript. 25-46 - Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura:
Updatable Encryption Secure Against Randomness Compromise. 47-69
Machine Learning and Security
- Ferhat Karakoç, Alptekin Küpçü, Melek Önen:
Fault Tolerant and Malicious Secure Federated Learning. 73-95 - Bhuvnesh Chaturvedi
, Anirban Chakraborty
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks. 96-117 - Ege Erdogan, Unat Teksen
, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek:
SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection. 118-142
Provable Security
- Sohto Chiku
, Keisuke Hara
, Keitaro Hashimoto
, Toi Tomita
, Junji Shikata
:
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption. 145-165 - Ryuya Hayashi, Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono, Goichiro Hanaoka:
Multi-query Verifiable PIR and Its Application. 166-190 - Nouri Alnahawi
, Kathrin Hövelmanns
, Andreas Hülsing
, Silvia Ritsch
:
Towards Post-quantum Secure PAKE - A Tight Security Proof for OCAKE in the BPR Model. 191-212
Cryptanalysis
- Mei Yan, Siwei Chen, Zejun Xiang, Shasha Zhang, Xiangyong Zeng:
A Novel Method for Finding Differential-Linear Distinguishers: Application to sfMidori64, sfCRAFT, and sfSkinny64. 215-239 - Wenchang Zhou, Jiqiang Lu:
Truncated Differential Cryptanalysis of the SPRING Block Cipher. 240-264 - Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba, Takanori Isobe:
Collision Attacks on Hashing Modes of Areion. 265-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.