Applied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II /
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected fro...
Corporate Author: | |
---|---|
Other Authors: | , |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2021.
|
Edition: | 1st ed. 2021. |
Series: | Security and Cryptology ;
12727 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-030-78375-4 |
Table of Contents:
- Analysis of Applied Systems
- Breaking and Fixing Third-Party Payment Service for Mobile Apps
- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
- Secure Computations
- Privacy-Preserving Data Aggregation with Probabilistic Range Validation
- LLVM-based Circuit Compilation for Practical Secure Computation
- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
- Cryptanalysis
- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
- Efficient Methods to Search for Best Differential Characteristics on SKINNY
- Towards Efficient LPN-Based Symmetric Encryption
- System Security
- A Differentially Private Hybrid Approach to Traffic Monitoring
- Proactive Detection of Phishing Kit Traffic
- Vestige: Identifying Binary Code Provenance for Vulnerability Detection
- SoK: Auditability and Accountability in Distributed Payment Systems
- Defending Web Servers Against Flash Crowd Attacks
- Cryptography and its Applications
- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
- Cryptanalysis of the Binary Permuted Kernel Problem
- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
- Improved Structured Encryption for SQL Databases via Hybrid Indexing. .