Abstract is missing.
- MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile DevicesBeatrice Perez, Abhinav Mehrotra, Mirco Musolesi. 3-24 [doi]
- Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScriptIliana Fayolle, Jan Wichelmann, Anja Köhl, Walter Rudametkin, Thomas Eisenbarth 0001, Clémentine Maurice. 25-46 [doi]
- Updatable Encryption Secure Against Randomness CompromiseYuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda 0002, Kanta Matsuura. 47-69 [doi]
- Fault Tolerant and Malicious Secure Federated LearningFerhat Karakoç, Alptekin Küpçü, Melek Önen. 73-95 [doi]
- On the Security of Privacy-Preserving Machine Learning Against Model Stealing AttacksBhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay. 96-117 [doi]
- SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier DetectionEge Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek. 118-142 [doi]
- How to Apply Fujisaki-Okamoto Transformation to Registration-Based EncryptionSohto Chiku, Keisuke Hara, Keitaro Hashimoto, Toi Tomita, Junji Shikata. 145-165 [doi]
- Multi-query Verifiable PIR and Its ApplicationRyuya Hayashi, Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono, Goichiro Hanaoka. 166-190 [doi]
- Towards Post-quantum Secure PAKE - A Tight Security Proof for OCAKE in the BPR ModelNouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch. 191-212 [doi]
- A Novel Method for Finding Differential-Linear Distinguishers: Application to sfMidori64, sfCRAFT, and sfSkinny64Mei Yan, Siwei Chen 0005, Zejun Xiang 0001, Shasha Zhang, Xiangyong Zeng. 215-239 [doi]
- Truncated Differential Cryptanalysis of the SPRING Block CipherWenchang Zhou, Jiqiang Lu. 240-264 [doi]
- Collision Attacks on Hashing Modes of AreionKodai Taiyama, Kosei Sakamoto, Rentaro Shiba, Takanori Isobe 0001. 265-285 [doi]