Applied cryptography and network security 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings. Part II /
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected fro...
Corporate Authors: | ACNS (Conference) Online) |
---|---|
Other Authors: | ACNS (Conference), Sako, Kazue,, Tippenhauer, Nils Ole,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
[2021]
|
Physical Description: |
1 online resource (xiv, 512 pages) : illustrations (some color). |
Series: |
Lecture notes in computer science ;
12727. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Analysis of Applied Systems
- Breaking and Fixing Third-Party Payment Service for Mobile Apps
- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
- Secure Computations
- Privacy-Preserving Data Aggregation with Probabilistic Range Validation
- LLVM-based Circuit Compilation for Practical Secure Computation
- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
- Cryptanalysis
- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
- Efficient Methods to Search for Best Differential Characteristics on SKINNY
- Towards Efficient LPN-Based Symmetric Encryption
- System Security
- A Differentially Private Hybrid Approach to Traffic Monitoring
- Proactive Detection of Phishing Kit Traffic
- Vestige: Identifying Binary Code Provenance for Vulnerability Detection
- SoK: Auditability and Accountability in Distributed Payment Systems
- Defending Web Servers Against Flash Crowd Attacks
- Cryptography and its Applications
- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
- Cryptanalysis of the Binary Permuted Kernel Problem
- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
- Improved Structured Encryption for SQL Databases via Hybrid Indexing.