Cryptology and network security 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, proceedings

Zero-knowledge and MPC.- Efficient NIZK Arguments with Straight-Line Simulation and Extraction.- Updatable NIZKs from Non-Interactive Zaps.- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's.- Public-key Infrastructure.- Oh SSH-it, what's my fing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: CANS (VerfasserIn)
Weitere Verfasser: Beresford, Alastair R. (HerausgeberIn), Patra, Arpita (HerausgeberIn), Bellini, Emanuele (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Cham Springer 2022
Schriftenreihe:Lecture notes in computer science 13641
Schlagworte:
Online Zugang:Cover
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use 2022 Chan, Kwan Yin
Passive Triangulation Attack on ORide 2022 Murthy, Shyam
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters 2022 Mandal, Kalikinkar
Redacting Blockchain Without Exposing Chameleon Hash Collisions 2022 Astrizi, Thiago Leucz
Cryptanalysis of the Multi-Power RSA Cryptosystem Variant 2022 Alquie, Didier
Analyzing Price Deviations in DeFi Oracles 2022 Gangwal, Ankit
Provable Security of HADES Structure 2022 Gao, Yuan
Anonymous Random Allocation and Its Applications 2022 Soleimanian, Azam
Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU’s 2022 Aly, Abdelrahaman
Efficient NIZK Arguments with Straight-Line Simulation and Extraction 2022 Ciampi, Michele
Oh SSH-it, What’s My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS 2022 Neef, Sebastian
Auditable Asymmetric Password Authenticated Public Key Establishment 2022 Faonio, Antonio
Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era 2022 Schardong, Frederico
Updatable NIZKs from Non-Interactive Zaps 2022 Baghery, Karim
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard 2022 Barthoulot, Anais
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments 2022 Unal, Musa Sadik
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN 2022 Lin, Dongdong
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysıs of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh 2022 Krzywiecki, Lukasz
ACDC: Anonymous Crowdsourcing Using Digital Cash 2022 Saavedra, Luis A.
Efficient Proofs of Retrievability Using Expander Codes 2022 Levy-dit-Vehel, Françoise
Alle Artikel auflisten