Abstract is missing.
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification SchemesDaniel Kales, Greg Zaverucha. 3-22 [doi]
- Energy Analysis of Lightweight AEAD CircuitsAndrea Caforio, Fatih Balli, Subhadeep Banik. 23-42 [doi]
- Cross-Site Search Attacks: Unauthorized Queries over Private DataBar Meyuhas, Nethanel Gelernter, Amir Herzberg. 43-62 [doi]
- Stronger Targeted Poisoning Attacks Against Malware DetectionShintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto. 65-84 [doi]
- STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android EnvironmentsSaurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep K. Shukla. 85-106 [doi]
- HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers SecurityPablo Picazo-Sanchez, Gerardo Schneider 0003, Andrei Sabelfeld. 107-126 [doi]
- Detecting Word Based DGA Domains Using Ensemble ModelsP. V. Sai Charan, Sandeep K. Shukla, P. Mohan Anand. 127-143 [doi]
- Distance-Bounding, Privacy-Preserving Attribute-Based CredentialsDaniel Bosk, Simon Bouget, Sonja Buchegger. 147-166 [doi]
- Trenchcoat: Human-Computable Hashing Algorithms for Password GenerationRuthu Hulikal Rooparaghunath, T. S. Harikrishnan, Debayan Gupta. 167-187 [doi]
- Provably Secure Scalable Distributed Authentication for CloudsAndrea Huszti, Norbert Oláh. 188-210 [doi]
- Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUICFynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf. 211-231 [doi]
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OTCyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart. 235-258 [doi]
- Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof CompositionYoussef El Housni, Aurore Guillevic. 259-279 [doi]
- Curves with Fast Computations in the First Pairing GroupRémi Clarisse, Sylvain Duquesne, Olivier Sanders. 280-298 [doi]
- Revisiting ECM on GPUsJonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu. 299-319 [doi]
- Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset BlockchainsAdriano Di Luzio, Danilo Francati, Giuseppe Ateniese. 323-343 [doi]
- Detecting Covert Cryptomining Using HPCAnkit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti. 344-364 [doi]
- Lightweight Virtual Payment ChannelsMaxim Jourenko, Mario Larangeira, Keisuke Tanaka. 365-384 [doi]
- Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHETapas Pal, Ratna Dutta. 387-408 [doi]
- Linear Complexity Private Set Intersection for Secure Two-Party ProtocolsFerhat Karakoç, Alptekin Küpçü. 409-429 [doi]
- Compact Multi-Party Confidential TransactionsJayamine Alupotha, Xavier Boyen, Ernest Foo. 430-452 [doi]
- Simulation Extractable Versions of Groth's zk-SNARK RevisitedKarim Baghery, Zaira Pindado, Carla Ràfols. 453-461 [doi]
- Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle ModelBernardo David, Rafael Dowsley. 462-481 [doi]
- Integral Cryptanalysis of Reduced-Round Tweakable TWINEMuhammad ElSheikh, Amr M. Youssef. 485-504 [doi]
- RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit CompilationHeiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel. 505-525 [doi]
- Assembly or Optimized C for Lightweight Cryptography on RISC-V?Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller 0006, Daan Sprenkels, Benoît Viguier. 526-545 [doi]
- Attack on LAC Key Exchange in Misuse SituationAurélien Greuet, Simon Montoya, Guénaël Renault. 549-569 [doi]
- Enhancing Code Based Zero-Knowledge Proofs Using Rank MetricEmanuele Bellini 0002, Philippe Gaborit, Alexandros Hasikos, Víctor Mateu. 570-592 [doi]
- A Secure Algorithm for Rounded Gaussian SamplingSéamus Brannigan, Máire O'Neill, Ayesha Khalid, Ciara Rafferty. 593-612 [doi]
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUsGyana Sahu, Kurt Rohloff. 613-632 [doi]