default search action
17th CANS 2018: Naples, Italy
- Jan Camenisch, Panos Papadimitratos:
Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings. Lecture Notes in Computer Science 11124, Springer 2018, ISBN 978-3-030-00433-0
Privacy
- Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster Privacy-Preserving Location Proximity Schemes. 3-22 - Varsha Bhat Kukkala, S. R. S. Iyengar:
Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach. 23-42 - Elena Pagnin, Carlo Brunetta, Pablo Picazo-Sanchez:
\mathsf HIKE : Walking the Privacy Trail. 43-66
Internet Misbehavior and Protection
- Liran Orevi, Amir Herzberg, Haim Zlatokrilov:
DNS-DNS: DNS-Based De-NAT Scheme. 69-88 - Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. 89-108 - Donald Nokam Kuate, Sébastien Canard, Renaud Sirdey:
Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline. 109-129
Malware
- Michael Denzel, Mark Dermot Ryan:
Malware Tolerant (Mesh-)Networks. 133-153 - Yassine Lemmou, El Mamoun Souidi:
Inside GandCrab Ransomware. 154-174
Symmetric Key Cryptography
- Bart Mennink:
The Relation Between CENC and NEMO. 177-189 - Yusuke Naito:
On the Efficiency of ZMAC-Type Modes. 190-210
Signatures
- Constantin Catalin Dragan, Daniel Gardham, Mark Manulis:
Hierarchical Attribute-Based Signatures. 213-234 - Johannes Blömer, Fabian Eidens, Jakob Juhnke:
Enhanced Security of Attribute-Based Signatures. 235-255 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Protean Signature Schemes. 256-276 - Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu:
Code-Based Signature Schemes from Identification Protocols in the Rank Metric. 277-298 - François Gérard, Keno Merckx:
SETLA: Signature and Encryption from Lattices. 299-320
Cryptanalysis
- Paolo Santini, Marco Baldi, Franco Chiaraluce:
Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes. 323-343 - Zhen Liu, Yanbin Pan, Tianyuan Xie:
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. 344-356 - Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Solving LWR via BDD Strategy: Modulus Switching Approach. 357-376 - Momonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda:
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation. 377-393 - Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Several MILP-Aided Attacks Against SNOW 2.0. 394-413
Cryptographic Primitives
- Masahito Ishizaka, Kanta Matsuura:
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption. 417-439 - Razvan Rosie:
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions. 440-459
Cryptographic Protocols
- Javier Herranz, Germán Sáez:
Secret Sharing Schemes for (k, n)-Consecutive Access Structures. 463-480 - Koray Karabina, Angela Robinson:
Extending a Framework for Biometric Visual Cryptography. 481-494 - Kamalesh Acharya, Ratna Dutta:
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework. 495-515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.