19th International Conference on Applied Cryptography and Network Security
Kamakura, Japan
| 21-24 June 2021
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More Essam Ghadafi |
SnakeGX: a sneaky attack against SGX Enclaves Flavio Toffalini, Mariano Graziano, Mauro Conti and Jianying Zhou |
Towards Efficient LPN-Based Symmetric Encryption Thomas Locher, Sonia Bogos, Dario Korolija and Serge Vaudenay |
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings Mark Abspoel, Anders Dalskov, Daniel Escudero and Ariel Nof |
Proactive Detection of Phishing Kit Traffic Qian Cui, Guy-Vincent Jourdan and Iosif Viorel Onut |
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols Hannah Davis and Felix Günther |
Coin-Based Multi-Party Fair Exchange Handan Kilinc Alper and Alptekin Kupcu |
Cryptanalysis of the Binary Permuted Kernel Problem Thales Paiva and Routo Terada |
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts Hao Chen, Wei Dai, Miran Kim and Yongsoo Song |
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph Liu and Surya Nepal |
Unlinkable and Invisible γ-Sanitizable Signatures Angèle Bossuat and Xavier Bultel |
Access Control Encryption from Group Encryption Xiuhua Wang, Harry W.H. Wong and Sherman S. M. Chow |
Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou and Sang-Yoon Chang |
Threat for the Secure Remote Password Protocol and a leak in Apple’s Cryptographic Library Andy Russon |
Breaking and Fixing Third-Party Payment Service for Mobile Apps Shangcheng Shi, Xianbo Wang and Wing Cheong Lau |
Privacy-Preserving Data Aggregation with Probabilistic Range Validation F.W. Dekker and Zekeriya Erkin |
LLVM-based Circuit Compilation for Practical Secure Computation Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert and Hossein Yalame |
Password Protected Secret Sharing from Lattices Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo and Reihaneh Safavi-Naini |
An Efficient Certificate-Based Signature Scheme in the Standard Model Guoqiang Wang and Yanmei Cao |
CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning Yuqi Chen, Xiaoyu Zhang, Yi Xie, Meixia Miao and Xu Ma |
Blind Polynomial Evaluation and Data Trading Yi Liu, Qi Wang and Siu Ming Yiu |
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange Carsten Baum, Bernardo David and Tore Frederiksen |
WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets David Chaum, Mario Larangeira, Mario Yaksetig and William Carter |
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems Gennaro Avitabile, Daniele Friolo and Ivan Visconti |
Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles Ren Ishibashi and Kazuki Yoneyama |
Analysis of Client-side Security for Long-term Time-stamping Services Long Meng and Liqun Chen |
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks Hervé Chabanne, Jean-Luc Danger, Linda Guiga and Ulrich Kühne |
Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems Kiyofumi Tanaka, Atsuko Miyaji and Yaoan Jin |
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements Ruben Groot Roessink, Andreas Peter and Florian Hahn |
Efficient Methods to Search for Best Differential Characteristics on SKINNY Stephanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard and Charles Prud'Homme |
A Differentially Private Hybrid Approach to Traffic Monitoring Rogério Rocha, Pedro Libório, Harsh Kupwade Patil and Diego Aranha |
Vestige: Identifying Binary Code Provenance for Vulnerability Detection Yuede Ji, Lei Cui and H. Howie Huang |
SoK: Auditability and Accountability in Distributed Payment Systems Panagiotis Chatzigiannis, Foteini Baldimtsi and Konstantinos Chalkias |
Defending Web Servers Against Flash Crowd Attacks Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic |
TurboIKOS: Improved Non-interactive Zero Knowledge with Sublinear Memory Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan ZhangYaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan Zhang |
Improved Structured Encryption for SQL Databases via Hybrid Indexing David Cash, Ruth Ng and Adam Rivkin |
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing Shuangpeng Bai, Dongliang Fang, Yue Sun, Puzhuo Liu, Hui Wen and Limin Sun |