© 2018

Applied Cryptography and Network Security

16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings

  • Bart Preneel
  • Frederik Vercauteren
Conference proceedings ACNS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10892)

Also part of the Security and Cryptology book sub series (LNSC, volume 10892)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Cryptographic Protocols

    1. Front Matter
      Pages 1-1
    2. Benjamin Dowling, Kenneth G. Paterson
      Pages 3-21
    3. Yotam Harchol, Ittai Abraham, Benny Pinkas
      Pages 22-43
    4. Georg Fuchsbauer, Michele Orrù
      Pages 44-62
  3. Side Channel Attacks and Tamper Resistance

    1. Front Matter
      Pages 63-63
    2. Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
      Pages 83-102
    3. Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
      Pages 103-120
    4. Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
      Pages 121-139
  4. Digital Signatures

    1. Front Matter
      Pages 141-141
    2. Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
      Pages 143-162
    3. Cecilia Boschini, Jan Camenisch, Gregory Neven
      Pages 163-182
    4. Dario Catalano, Dario Fiore, Luca Nizzardo
      Pages 183-201
  5. Privacy Preserving Computation

    1. Front Matter
      Pages 241-241
    2. Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
      Pages 243-261
    3. Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
      Pages 262-279
    4. Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
      Pages 280-300

About these proceedings


This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.

The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.


access control authentication bandwidth ciphertexts cloud security computer crime cryptography data mining data privacy digital signature electronic document identification systems encryption multi-party computation privacy project management public key cryptography security protocols security systems software engineering structural design

Editors and affiliations

  1. 1.imec-COSICKU LeuvenHeverleeBelgium
  2. 2.imec-COSICKU LeuvenHeverleeBelgium

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment