Applied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II /

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected fro...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Sako, Kazue. (Editor, http://id.loc.gov/vocabulary/relators/edt), Tippenhauer, Nils Ole. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Series:Security and Cryptology ; 12727
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-78375-4
Table of Contents:
  • Analysis of Applied Systems
  • Breaking and Fixing Third-Party Payment Service for Mobile Apps
  • DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
  • Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
  • Secure Computations
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation
  • LLVM-based Circuit Compilation for Practical Secure Computation
  • An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
  • Cryptanalysis
  • Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
  • Efficient Methods to Search for Best Differential Characteristics on SKINNY
  • Towards Efficient LPN-Based Symmetric Encryption
  • System Security
  • A Differentially Private Hybrid Approach to Traffic Monitoring
  • Proactive Detection of Phishing Kit Traffic
  • Vestige: Identifying Binary Code Provenance for Vulnerability Detection
  • SoK: Auditability and Accountability in Distributed Payment Systems
  • Defending Web Servers Against Flash Crowd Attacks
  • Cryptography and its Applications
  • TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
  • Cryptanalysis of the Binary Permuted Kernel Problem
  • Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
  • Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
  • Improved Structured Encryption for SQL Databases via Hybrid Indexing. .