Search
Search Results
-
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part I
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...
-
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...
-
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part III
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...
-
BUFFing Threshold Signature Schemes
We explore advanced security notions for threshold signature schemes, focusing on Beyond UnForgeability Features (BUFF), introduced by Cremers et al.... -
Post-quantum Asynchronous Remote Key Generation for FIDO2
The Fast IDentity Online (FIDO) Alliance has developed the widely adopted FIDO2 protocol suite that allows for passwordless online authentication.... -
Key Derivation Functions Without a Grain of Salt
Key derivation functions (KDFs) are integral to many cryptographic protocols. Their functionality is to turn raw key material, such as a... -
-
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...
-
Integrating Causality in Messaging Channels
Causal reasoning plays an important role in the comprehension of communication, but it has been elusive so far how causality should be properly... -
Post-quantum Security for the Extended Access Control Protocol
The Extended Access Control (EAC) protocol for authenticated key agreement is mainly used to secure connections between machine-readable travel... -
Searching for ELFs in the Cryptographic Forest
Extremely Lossy Functions (ELFs) are families of functions that, depending on the choice during key generation, either operate in injective mode or... -