Update cookies preferences

E-book: Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings

Edited by , Edited by , Edited by
  • Format - PDF+DRM
  • Price: 98,18 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.

The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.

Encryption.- Cross-Domain Attribute-Based Access Control Encryption.-
Grain-128AEADv2: Strengthening the Initialization Against Key
Reconstruction.- Partition Oracles from Weak Key Forgeries.- Practical
Privacy-Preserving Face Identification based on FunctionHiding Functional
Encryption.- The Matrix Reloaded: Multiplication Strategies in FrodoKEM.-
Signatures.- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from
OR-Proofs.- Effcient Threshold-Optimal ECDSA.- GMMT: A Revocable Group Merkle
Multi-Tree Signature Scheme.- Issuer-Hiding Attribute-Based Credentials.-
Report and Trace Ring Signatures.- Selectively Linkable Group Signatures
Stronger Security and Preserved Verifiability.- Cryptographic Schemes and
Protocols.- FO-like Combiners and Hybrid Post-Quantum Cryptography.-
Linear-time oblivious permutations for SPDZ.- On the Higher-bit Version of
Approximate Inhomogeneous Short Integer Solution Problem.- Practical
Continuously Non-Malleable Randomness Encoders in the Random Oracle Model.-
Attacks and Counter-Measures.- Countermeasures against Backdoor Attacks
towards Malware Detectors.- Free By Design: On the Feasibility Of Free-Riding
Attacks Against Zero-Rated Services.- Function-private Conditional Disclosure
of Secrets and Multi-evaluation Threshold Distributed Point Functions.- How
Distance-bounding can Detect Internet Traffc Hijacking.- SoK: Secure Memory
Allocation.- Toward Learning Robust Detectors from Imbalanced Datasets
Leveraging Weighted Adversarial Training.- Towards Quantum Large-Scale
Password Guessing on Real-World Distributions.- Attestation and
Verification.- Anonymous Transactions with Revocation and Auditing in
Hyperledger Fabric.- Attestation Waves: Platform Trust via Remote Power
Analysis.- How (not) to Achieve both Coercion Resistance and Cast as Intended
Verifiability in Remote eVoting.- Subversion-Resistant Quasi-Adaptive NIZK
and Applications to Modular zk-SNARKs.- THC: Practical and Cost-Effective
Verification of Delegated Computation.- Tiramisu: Black-Box Simulation
Extractable NIZKs in the Updatable CRS Model.