Cryptology and network security 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings /

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedin...

Full description

Corporate Authors: International Conference on Cryptology and Network Security Dubai, United Arab Emirates)
Other Authors: International Conference on Cryptology and Network Security, Beresford, Alastair R.,, Patra, Arpita,, Bellini, Emanuele,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, [2022]
Physical Description: 1 online resource (xiii, 391 pages) : illustrations (some color).
Series: Lecture notes in computer science ; 13641.
Subjects:
Table of Contents:
  • Zero-knowledge and MPC
  • Efficient NIZK Arguments with Straight-Line Simulation and Extraction
  • Updatable NIZKs from Non-Interactive Zaps
  • Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLUs
  • Public-key Infrastructure
  • Oh SSH-it, whats my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS
  • Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use
  • Auditable Asymmetric Password Authenticated Public Key Establishment
  • (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
  • Attacks and Countermeasures
  • Passive Triangulation Attack on ORide
  • HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments
  • Cryptanalysis and Provable Security
  • The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN
  • How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh
  • Cryptanalysis of the Multi-Power RSA Cryptosystem Variant
  • Provable Security of HADES Structure
  • Cryptographic Protocols
  • Practical Single-pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters
  • Anonymous Random Allocation and Its Applications
  • ACDC: Anonymous Crowdsourcing using Digital Cash
  • Blockchain and Payment Systems
  • Analyzing Price Deviations in DeFi Oracles
  • Redacting Blockchain without Exposing Chameleon Hash Collisions
  • Codes and Post-Quantum Cryptography
  • Efficient Proofs of Retrievability using Expander Codes
  • Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era.