04617nam 22007215 450 991048489540332120251225180511.03-030-78375-810.1007/978-3-030-78375-4(CKB)4100000011954111(DE-He213)978-3-030-78375-4(MiAaPQ)EBC6640062(Au-PeEL)EBL6640062(OCoLC)1256814214(PPN)257358552(EXLCZ)99410000001195411120210609d2021 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II /edited by Kazue Sako, Nils Ole Tippenhauer1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (XIV, 512 p. 125 illus., 77 illus. in color.)Security and Cryptology,2946-1863 ;127273-030-78374-X Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in DistributedPayment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing. .The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.Security and Cryptology,2946-1863 ;12727Data protectionComputer networksCryptographyData encryption (Computer science)Application softwareComputer networksSecurity measuresData and Information SecurityComputer Communication NetworksCryptologyComputer and Information Systems ApplicationsMobile and Network SecurityData protection.Computer networks.Cryptography.Data encryption (Computer science).Application software.Computer networksSecurity measures.Data and Information Security.Computer Communication Networks.Cryptology.Computer and Information Systems Applications.Mobile and Network Security.005.82Sako Kazue(Innovation Producer)Tippenhauer Nils OleMiAaPQMiAaPQMiAaPQBOOK9910484895403321Applied Cryptography and Network Security771881UNINA