Applied cryptography and network security 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings. Part II /

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected fro...

Full description

Corporate Authors: ACNS (Conference) Online)
Other Authors: ACNS (Conference), Sako, Kazue,, Tippenhauer, Nils Ole,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, [2021]
Physical Description: 1 online resource (xiv, 512 pages) : illustrations (some color).
Series: Lecture notes in computer science ; 12727.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Analysis of Applied Systems
  • Breaking and Fixing Third-Party Payment Service for Mobile Apps
  • DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
  • Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
  • Secure Computations
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation
  • LLVM-based Circuit Compilation for Practical Secure Computation
  • An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
  • Cryptanalysis
  • Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
  • Efficient Methods to Search for Best Differential Characteristics on SKINNY
  • Towards Efficient LPN-Based Symmetric Encryption
  • System Security
  • A Differentially Private Hybrid Approach to Traffic Monitoring
  • Proactive Detection of Phishing Kit Traffic
  • Vestige: Identifying Binary Code Provenance for Vulnerability Detection
  • SoK: Auditability and Accountability in Distributed Payment Systems
  • Defending Web Servers Against Flash Crowd Attacks
  • Cryptography and its Applications
  • TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
  • Cryptanalysis of the Binary Permuted Kernel Problem
  • Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
  • Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
  • Improved Structured Encryption for SQL Databases via Hybrid Indexing.