ACNS 2021论文录用列表
2021-04-22 00:11:43 Author: mp.weixin.qq.com(查看原文) 阅读量:69 收藏

应用密码与网络安全ACNS (Applied Cryptography and Network Security)是国际知名的密码学与网络安全的会议。ACNS 2021是第19届国际学术会议,该会议接受率较低,2021年共录用了37篇论文,详细接收论文列表如下:

  • Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More

Essam Ghadafi

  • SnakeGX: a sneaky attack against SGX Enclaves

Flavio Toffalini, Mariano Graziano, Mauro Conti and Jianying Zhou

  • Towards Efficient LPN-Based Symmetric Encryption

Thomas Locher, Sonia Bogos, Dario Korolija and Serge Vaudenay

  • An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings

Mark Abspoel, Anders Dalskov, Daniel Escudero and Ariel Nof

  • Proactive Detection of Phishing Kit Traffic

Qian Cui, Guy-Vincent Jourdan and Iosif Viorel Onut

  • Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols

Hannah Davis and Felix Günther

  • Coin-Based Multi-Party Fair Exchange

Handan Kilinc Alper and Alptekin Kupcu

  • Cryptanalysis of the Binary Permuted Kernel Problem

Thales Paiva and Routo Terada

  • Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts

Hao Chen, Wei Dai, Miran Kim and Yongsoo Song

  • Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves

Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph Liu and Surya Nepal

  • Unlinkable and Invisible γ-Sanitizable Signatures

Angèle Bossuat and Xavier Bultel

  • Access Control Encryption from Group Encryption

Xiuhua Wang, Harry W.H. Wong and Sherman S. M. Chow

  • Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms

Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou and Sang-Yoon Chang

  • Threat for the Secure Remote Password Protocol and a leak in Apple’s Cryptographic Library

Andy Russon

  • Breaking and Fixing Third-Party Payment Service for Mobile Apps

Shangcheng Shi, Xianbo Wang and Wing Cheong Lau

  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

F.W. Dekker and Zekeriya Erkin

  • LLVM-based Circuit Compilation for Practical Secure Computation

Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert and Hossein Yalame

  • Password Protected Secret Sharing from Lattices

Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo and Reihaneh Safavi-Naini

  • An Efficient Certificate-Based Signature Scheme in the Standard Model

Guoqiang Wang and Yanmei Cao

  • CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning

Yuqi Chen, Xiaoyu Zhang, Yi Xie, Meixia Miao and Xu Ma

  • Blind Polynomial Evaluation and Data Trading

Yi Liu, Qi Wang and Siu Ming Yiu

  • P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange

Carsten Baum, Bernardo David and Tore Frederiksen

  • WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets

David Chaum, Mario Larangeira, Mario Yaksetig and William Carter

  • Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems

Gennaro Avitabile, Daniele Friolo and Ivan Visconti

  • Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles

Ren Ishibashi and Kazuki Yoneyama

  • Analysis of Client-side Security for Long-term Time-stamping Services

Long Meng and Liqun Chen

  • Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks

Hervé Chabanne, Jean-Luc Danger, Linda Guiga and Ulrich Kühne

  • Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems

Kiyofumi Tanaka, Atsuko Miyaji and Yaoan Jin

  • Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements

Ruben Groot Roessink, Andreas Peter and Florian Hahn

  • Efficient Methods to Search for Best Differential Characteristics on SKINNY

Stephanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard and Charles Prud'Homme

  • A Differentially Private Hybrid Approach to Traffic Monitoring

Rogério Rocha, Pedro Libório, Harsh Patil and Diego Aranha

  • Vestige: Identifying Binary Code Provenance for Vulnerability Detection

Yuede Ji, Lei Cui and H. Howie Huang

  • SoK: Auditability and Accountability in Distributed Payment Systems

Panagiotis Chatzigiannis, Foteini Baldimtsi and Konstantinos Chalkias

  • Defending Web Servers Against Flash Crowd Attacks

Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic

  • TurboIKOS: Improved Non-interactive Zero Knowledge with Sublinear Memory

Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan ZhangYaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan Zhang

  • Improved Structured Encryption for SQL Databases via Hybrid Indexing

David Cash, Ruth Ng and Adam Rivkin

  • DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing

Shuangpeng Bai, Dongliang Fang, Yue Sun, Puzhuo Liu, Hui Wen and Limin Sun

会议地址
http://sulab-sever.u-aizu.ac.jp/ACNS2021/index.html

安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247485787&idx=1&sn=e1d9104918abb7fb52eaaa156cde849b&chksm=fe2ef6d0c9597fc69c8d88e3fae2ab4e6d40db8d1065406747bd8024a514ddb362a79631c1ca#rd
如有侵权请联系:admin#unsafe.sh