Abstract is missing.
- Cryptographically Assured Information Flow: Assured Remote ExecutionScott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov. 1-16 [doi]
- Secrecy by Typing in the Computational ModelStéphanie Delaune, Clément Hérouard, Joseph Lallemand. 17-32 [doi]
- Strands Rocq: Why is a Security Protocol Correct, Mechanically?Matteo Busi 0001, Riccardo Focardi, Flaminia L. Luccio. 33-48 [doi]
- AGATE: Augmented Global Attested Trusted Execution in the Universal Composability FrameworkLorenzo Martinico, Markulf Kohlweiss. 49-64 [doi]
- Self-Defense: Optimal QIF Solutions and Application to Website FingerprintingAndreas Athanasiou, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi. 65-80 [doi]
- Actual Knowledge Gain as Privacy Loss in Local Privacy AccountingMingen Pan. 81-96 [doi]
- Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large DictionariesMingen Pan. 97-112 [doi]
- Session Types for the Concurrent Composition of Interactive Differential PrivacyVictor Sannier, Patrick Baillot, Marco Gaboardi. 113-126 [doi]
- Privacy-Preserving Server-Supported DecryptionPeeter Laud, Alisa Pankova, Jelizaveta Vakarjuk. 127-142 [doi]
- Scalable Private SignalingSashidhar Jakkamsetti, Zeyu Liu 0004, Varun Madathil. 143-158 [doi]
- Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset SimulationKeitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara. 159-174 [doi]
- Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational AgentsLéonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard. 175-189 [doi]
- On DoS Vulnerability of Regular Expressions, with and Without BackreferencesTachio Terauchi. 190-204 [doi]
- Rethinking Attack Path Management: A New Metric for Choke Points in Attack GraphsYumeng Zhang, Max Ward 0001, Hung Nguyen 0004. 205-219 [doi]
- Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure HandoversBhagya Wimalasiri, Benjamin Dowling, Rabiah Alnashwan. 220-235 [doi]
- Formal Robustness for Cyber-Physical Systems Under Timed AttacksJian Xiang, Simone Tini, Ruggero Lanotte, Massimo Merro. 236-251 [doi]
- Accountability, Involvement, and Mediation for Information FlowElisavet Kozyri, Fred B. Schneider, Stephen Chong. 252-267 [doi]
- A Graded Modal Approach to Relaxed Semantic DeclassificationVineet Rajani, Alex Coleman, Hrutvik Kanabar. 268-283 [doi]
- Securing P4 Programs by Information Flow ControlAnoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam. 284-299 [doi]
- Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain EcosystemsStephan Dübler, Federico Badaloni, Pedro Moreno-Sanchez, Clara Schneidewind. 300-315 [doi]
- $BitML^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style CryptocurrenciesFederico Badaloni, Sebastian Holler, Chrysoula Oikonomou, Pedro Moreno-Sanchez, Clara Schneidewind. 316-330 [doi]
- VRaaS: Verifiable Randomness as a Service on BlockchainsJacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan. 331-346 [doi]
- One For All: Formally Verifying Protocols which use Aggregate SignaturesXenia Hofmeier, Andrea Raguso, Ralf Sasse, Dennis Jackson, David A. Basin. 347-362 [doi]
- Nominal State-Separating ProofsMarkus Krabbe Larsen, Carsten Schürmann. 363-377 [doi]
- Symbolic Parallel Composition for Multi-language Protocol VerificationFaezeh Nasrabadi, Robert Künnemann, Hamed Nemati. 378-393 [doi]
- Formal Analysis of Random Nonce Misuses in Cryptographic ProtocolsGildas Avoine, Tristan Claverie, Stéphanie Delaune. 394-409 [doi]
- A Novel Approach to Differential Privacy with Alpha DivergenceYifeng Liu, Zehua Wang. 410-424 [doi]
- Unveiling the (in)Security of Threshold FHE-Based Federated Learning: The Practical Impact of Recent CPAD AttacksAdda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche. 425-440 [doi]
- Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and ApplicationThomas Haines, Rafieh Mosaheb, Johannes Müller 0001, Reetika. 441-456 [doi]
- Verifiable E-Voting with a Trustless Bulletin BoardDaniel Rausch 0001, Nicolas Huber, Ralf Küsters. 457-472 [doi]
- Dynamic Group Signatures with Verifier-Local RevocationCallum London, Daniel Gardham, Constantin Catalin Dragan. 473-488 [doi]
- Automated Analysis and Synthesis of Message Authentication CodesStefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas. 489-504 [doi]
- SMT-Based Automation for Overwhelming TruthDavid Baelde, Stéphanie Delaune, Stanislas Riou. 505-520 [doi]
- Automatic Verification of Finite Variant Property Beyond Convergent Equational TheoriesVincent Cheval, Caroline Fontaine. 521-536 [doi]
- Nonmalleable Progress LeakageEthan Cecchetti. 537-552 [doi]
- Gradual Sensitivity TypingDamián Árquez, Matías Toro, Éric Tanter. 553-568 [doi]
- FSLH: Flexible Mechanized Speculative Load HardeningJonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig, Catalin Hritcu. 569-584 [doi]
- An Extension of the Adversarial Threat Model in Quantitative Information FlowMohammad A. Zarrabian, Parastoo Sadeghi. 585-600 [doi]