Skip to main content
  • Conference proceedings
  • © 2019

Applied Cryptography and Network Security

17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings

Editors:

(view affiliations)

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11464)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2019.

Buying options

eBook
USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-21568-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 99.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xiii
  2. Integrity and Cryptanalysis

    1. Front Matter

      Pages 1-1
    2. Rate-Optimizing Compilers for Continuously Non-malleable Codes

      • Sandro Coretti, Antonio Faonio, Daniele Venturi
      Pages 3-23
    3. Re: What’s Up Johnny?

      • Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk
      Pages 24-42
    4. Cryptanalysis of ForkAES

      • Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier et al.
      Pages 43-63
  3. Digital Signature and MAC

    1. Front Matter

      Pages 65-65
    2. Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures

      • Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
      Pages 67-88
    3. Raptor: A Practical Lattice-Based (Linkable) Ring Signature

      • Xingye Lu, Man Ho Au, Zhenfei Zhang
      Pages 110-130
  4. Software and Systems Security

    1. Front Matter

      Pages 153-153
    2. DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping

      • Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia
      Pages 155-174
    3. Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems

      • Jairo Giraldo, David Urbina, Alvaro A. Cardenas, Nils Ole Tippenhauer
      Pages 175-195
    4. A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS

      • John Henry Castellanos, Jianying Zhou
      Pages 196-216
    5. PassGAN: A Deep Learning Approach for Password Guessing

      • Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz
      Pages 217-237
  5. Blockchain and Cryptocurrency

    1. Front Matter

      Pages 239-239
    2. Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners

      • Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen
      Pages 241-258
    3. Longitudinal Analysis of Misuse of Bitcoin

      • Karim Eldefrawy, Ashish Gehani, Alexandre Matton
      Pages 259-278
  6. Post Quantum Cryptography

    1. Front Matter

      Pages 279-279
    2. Faster Multiplication in \(\mathbb {Z}_{2^m}[x]\) on Cortex-M4 to Speed up NIST PQC Candidates

      • Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
      Pages 281-301

Other Volumes

  1. Applied Cryptography and Network Security

    17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
  2. Applied Cryptography and Network Security Workshops

    ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings

About this book

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019.
The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Keywords

  • applied cryptography
  • blockchain security
  • cryptanalysis
  • cyber-physical systems security
  • digital signatures
  • lattice-based cryptography
  • privacy enhancing techniques
  • public key cryptography
  • post-quantum cryptography
  • systems security
  • authentication
  • ciphertexts
  • computer crime
  • computer science
  • cryptography
  • data privacy
  • electronic document identification systems
  • encryption
  • network security
  • privacy

Editors and Affiliations

  • Singapore Management University, Singapore, Singapore

    Robert H. Deng

  • Universidad del Rosario, Bogota, Colombia

    Valérie Gauthier-Umaña

  • Cyxtera Technologies, Bogota, Colombia

    Martín Ochoa

  • Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buying options

eBook
USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-21568-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 99.99
Price excludes VAT (USA)