Applied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected fro...

Full description

Bibliographic Details
Other Authors: Sako, Kazue (Editor), Tippenhauer, Nils Ole (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03648nmm a2200397 u 4500
001 EB001994105
003 EBX01000000000000001157007
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210702 ||| eng
020 |a 9783030783754 
100 1 |a Sako, Kazue  |e [editor] 
245 0 0 |a Applied Cryptography and Network Security  |h Elektronische Ressource  |b 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II  |c edited by Kazue Sako, Nils Ole Tippenhauer 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a XIV, 512 p. 125 illus., 77 illus. in color  |b online resource 
505 0 |a Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in DistributedPayment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing. 
653 |a Computer Communication Networks 
653 |a Mobile and Network Security 
653 |a Computer networks / Security measures 
653 |a Cryptography 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a Tippenhauer, Nils Ole  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-030-78375-4 
856 4 0 |u https://doi.org/10.1007/978-3-030-78375-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications