Skip to main content
  • Conference proceedings
  • © 2018

Applied Cryptography and Network Security

16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10892)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2018.

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-93387-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XIV
  2. Cryptographic Protocols

    1. Front Matter

      Pages 1-1
    2. A Cryptographic Analysis of the WireGuard Protocol

      • Benjamin Dowling, Kenneth G. Paterson
      Pages 3-21
    3. Distributed SSH Key Management with Proactive RSA Threshold Signatures

      • Yotam Harchol, Ittai Abraham, Benny Pinkas
      Pages 22-43
    4. Non-interactive Zaps of Knowledge

      • Georg Fuchsbauer, Michele Orrù
      Pages 44-62
  3. Side Channel Attacks and Tamper Resistance

    1. Front Matter

      Pages 63-63
    2. Drive-By Key-Extraction Cache Attacks from Portable Code

      • Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
      Pages 83-102
    3. On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography

      • Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
      Pages 103-120
    4. Continuously Non-malleable Codes with Split-State Refresh

      • Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
      Pages 121-139
  4. Digital Signatures

    1. Front Matter

      Pages 141-141
    2. Efficient Unconditionally Secure Signatures Using Universal Hashing

      • Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
      Pages 143-162
    3. Floppy-Sized Group Signatures from Lattices

      • Cecilia Boschini, Jan Camenisch, Gregory Neven
      Pages 163-182
    4. On the Security Notions for Homomorphic Signatures

      • Dario Catalano, Dario Fiore, Luca Nizzardo
      Pages 183-201
  5. Privacy Preserving Computation

    1. Front Matter

      Pages 241-241
    2. Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption

      • Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
      Pages 243-261
    3. Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs

      • Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
      Pages 262-279
    4. Nothing Refreshes Like a RePSI: Reactive Private Set Intersection

      • Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
      Pages 280-300

Other Volumes

  1. Applied Cryptography and Network Security

    16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings

About this book

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.

The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Keywords

  • access control
  • authentication
  • bandwidth
  • ciphertexts
  • cloud security
  • computer crime
  • cryptography
  • data mining
  • data privacy
  • digital signature
  • electronic document identification systems
  • encryption
  • multi-party computation
  • privacy
  • project management
  • public key cryptography
  • security protocols
  • security systems
  • software engineering
  • structural design

Editors and Affiliations

  • imec-COSIC, KU Leuven, Heverlee, Belgium

    Bart Preneel, Frederik Vercauteren

Bibliographic Information

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-93387-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)