应用密码与网络安全ACNS (Applied Cryptography and Network Security)是国际知名的密码学与网络安全的会议。ACNS 2021是第19届国际学术会议,该会议接受率较低,2021年共录用了37篇论文,详细接收论文列表如下:
- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
- SnakeGX: a sneaky attack against SGX Enclaves
Flavio Toffalini, Mariano Graziano, Mauro Conti and Jianying Zhou
- Towards Efficient LPN-Based Symmetric Encryption
Thomas Locher, Sonia Bogos, Dario Korolija and Serge Vaudenay
- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel, Anders Dalskov, Daniel Escudero and Ariel Nof
- Proactive Detection of Phishing Kit Traffic
Qian Cui, Guy-Vincent Jourdan and Iosif Viorel Onut
- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
- Coin-Based Multi-Party Fair Exchange
Handan Kilinc Alper and Alptekin Kupcu
- Cryptanalysis of the Binary Permuted Kernel Problem
Thales Paiva and Routo Terada
- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen, Wei Dai, Miran Kim and Yongsoo Song
- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph Liu and Surya Nepal
- Unlinkable and Invisible γ-Sanitizable Signatures
Angèle Bossuat and Xavier Bultel
- Access Control Encryption from Group Encryption
Xiuhua Wang, Harry W.H. Wong and Sherman S. M. Chow
- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou and Sang-Yoon Chang
- Threat for the Secure Remote Password Protocol and a leak in Apple’s Cryptographic Library
Andy Russon
- Breaking and Fixing Third-Party Payment Service for Mobile Apps
Shangcheng Shi, Xianbo Wang and Wing Cheong Lau
- Privacy-Preserving Data Aggregation with Probabilistic Range Validation
F.W. Dekker and Zekeriya Erkin
- LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert and Hossein Yalame
- Password Protected Secret Sharing from Lattices
Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo and Reihaneh Safavi-Naini
- An Efficient Certificate-Based Signature Scheme in the Standard Model
Guoqiang Wang and Yanmei Cao
- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning
Yuqi Chen, Xiaoyu Zhang, Yi Xie, Meixia Miao and Xu Ma
- Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang and Siu Ming Yiu
- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum, Bernardo David and Tore Frederiksen
- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum, Mario Larangeira, Mario Yaksetig and William Carter
- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile, Daniele Friolo and Ivan Visconti
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
Ren Ishibashi and Kazuki Yoneyama
- Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng and Liqun Chen
- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
Hervé Chabanne, Jean-Luc Danger, Linda Guiga and Ulrich Kühne
- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems
Kiyofumi Tanaka, Atsuko Miyaji and Yaoan Jin
- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
Ruben Groot Roessink, Andreas Peter and Florian Hahn
- Efficient Methods to Search for Best Differential Characteristics on SKINNY
Stephanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard and Charles Prud'Homme
- A Differentially Private Hybrid Approach to Traffic Monitoring
Rogério Rocha, Pedro Libório, Harsh Patil and Diego Aranha
- Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Yuede Ji, Lei Cui and H. Howie Huang
- SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis, Foteini Baldimtsi and Konstantinos Chalkias
- Defending Web Servers Against Flash Crowd Attacks
Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic
- TurboIKOS: Improved Non-interactive Zero Knowledge with Sublinear Memory
Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan ZhangYaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan Zhang
- Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash, Ruth Ng and Adam Rivkin
- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
Shuangpeng Bai, Dongliang Fang, Yue Sun, Puzhuo Liu, Hui Wen and Limin Sun
会议地址
http://sulab-sever.u-aizu.ac.jp/ACNS2021/index.html