LEADER 04913nam 22007095 450 001 9910755086603321 005 20231030202028.0 010 $a981-9975-63-8 024 7 $a10.1007/978-981-99-7563-1 035 $a(MiAaPQ)EBC30841319 035 $a(Au-PeEL)EBL30841319 035 $a(DE-He213)978-981-99-7563-1 035 $a(PPN)272914150 035 $a(EXLCZ)9928642498700041 100 $a20231030d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptology and Network Security$b[electronic resource] $e22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 ? November 2, 2023, Proceedings /$fedited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (593 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14342 311 08$aPrint version: Deng, Jing Cryptology and Network Security Singapore : Springer Singapore Pte. Limited,c2023 9789819975624 327 $aSchemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User?s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. 330 $aThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14342 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aApplication software 606 $aCryptology 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aData and Information Security 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 676 $a005.824 700 $aDeng$b Jing$01434748 701 $aKolesnikov$b Vladimir$01434749 701 $aSchwarzmann$b Alexander A$01434750 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910755086603321 996 $aCryptology and Network Security$93590333 997 $aUNINA