default search action
21st ACNS 2023: Kyoto, Japan - Part I
- Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer 2023, ISBN 978-3-031-33487-0
Side-Channel and Fault Attacks
- Barbara Gigerl, Robert Primas, Stefan Mangard:
Formal Verification of Arithmetic Masking in Hardware and Software. 3-32 - Martin Schwarzl, Erik Kraft, Daniel Gruss:
Layered Binary Templating. 33-58 - Kenta Tani, Noboru Kunihiro:
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences. 59-88 - Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. 89-116
Symmetric Cryptanalysis
- Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. 119-148 - Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. 149-177 - Subhadeep Banik, Daniel Collins, Willi Meier:
Near Collision Attack Against Grain V1. 178-207 - Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal:
TIDAL: Practical Collisions on State-Reduced Keccak Variants. 208-233
Web Security
- Cong Tian, Dengpan Ye, Chuanxi Chen:
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis. 237-259 - Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers. 260-283 - Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. 284-308 - Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. 309-336
Elliptic Curves and Pairings
- Youssef El Housni:
Pairings in Rank-1 Constraint Systems. 339-362 - Sabyasachi Karati:
Binary Kummer Line. 363-393 - Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems. 394-421
Homomorphic Cryptography
- Luke Harmon, Gaetan Delavignette, Arnab Roy, David William Honorio Araujo da Silva:
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption. 425-450 - Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra-Arnau, Thorsten Strufe:
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols. 451-475 - Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong:
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch. 476-500
Machine Learning
- Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo:
Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning. 503-531 - Hamdi Friji, Alexis Olivereau, Mireille Sarkiss:
Efficient Network Representation for GNN-Based Intrusion Detection. 532-554 - Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson:
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. 555-582 - Hongbin Chen, Chaohao Fu, Na Ruan:
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning. 583-604
Lattices and Codes
- Yang Tao, Rui Zhang, Yunfeng Ji:
Forward Security of Fiat-Shamir Lattice Signatures. 607-633 - Éric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier:
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices. 634-663 - Bénédikt Tran, Serge Vaudenay:
A Gapless Post-quantum Hash Proof System in the Hamming Metric. 664-694 - Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. 695-724 - Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoît Gérard:
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding. 725-748
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.