Abstract is missing.
- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security ProtocolsVéronique Cortier, Stéphanie Delaune, Jannik Dreier. 3-22 [doi]
- When Is a Test Not a Proof?Eleanor McMurtry, Olivier Pereira, Vanessa Teague. 23-41 [doi]
- Hardware Fingerprinting for the ARINC 429 Avionic BusNimrod Gilboa Markevich, Avishai Wool. 42-62 [doi]
- Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based DefinitionGoichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai 0001, Shota Yamada 0001. 65-85 [doi]
- SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information RetrievalJeongeun Park, Mehdi Tibouchi. 86-106 [doi]
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic EncryptionWilly Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk. 107-127 [doi]
- Linear Attack on Round-Reduced DES Using Deep LearningBotao Hou, Yongqiang Li, Haoyue Zhao, Bin Wu. 131-145 [doi]
- Detection by Attack: Detecting Adversarial Samples by Undercover AttackQifei Zhou, Rong Zhang, Bo Wu 0018, Weiping Li, Tong Mo. 146-164 [doi]
- Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender SystemsFabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato. 165-184 [doi]
- Active Re-identification Attacks on Periodically Released Dynamic Social GraphsXihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz. 185-205 [doi]
- Fooling Primality Tests on SmartcardsVladimir Sedlacek, Jan Jancar, Petr Svenda. 209-229 [doi]
- An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPADamián Aparicio-Sánchez, Santiago Escobar, Raúl Gutiérrez, Julia Sapiña. 230-250 [doi]
- On the Privacy Risks of Compromised Trigger-Action PlatformsYu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim. 251-271 [doi]
- Plenty of Phish in the Sea: Analyzing Potential Pre-attack SurfacesTobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann. 272-291 [doi]
- Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M CommunicationSebastian Paul, Patrik Scheible. 295-316 [doi]
- CSH: A Post-quantum Secret Handshake Scheme from Coding TheoryZhuoran Zhang, Fangguo Zhang, Haibo Tian. 317-335 [doi]
- A Verifiable and Practical Lattice-Based Decryption Mix Net with External AuditingXavier Boyen, Thomas Haines, Johannes Müller 0001. 336-356 [doi]
- A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public KeyWenling Liu, Zhen Liu 0008, Khoa Nguyen, Guomin Yang, Yu Yu. 357-377 [doi]
- Post-Quantum Adaptor Signatures and Payment Channel NetworksMuhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin. 378-397 [doi]
- Linear-Complexity Private Function Evaluation is PracticalMarco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider 0003. 401-420 [doi]
- Certifying Decision Trees Against Evasion Attacks by Program AnalysisStefano Calzavara, Pietro Ferrara, Claudio Lucchese. 421-438 [doi]
- They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm OptimizationRayan Mosli, Matthew Wright, Bo Yuan 0005, Yin Pan. 439-459 [doi]
- Understanding Object Detection Through an Adversarial LensKa Ho Chow, Ling Liu 0001, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu. 460-481 [doi]
- Signatures with Tight Multi-user Security from Search AssumptionsJiaxin Pan, Magnus Ringerud. 485-504 [doi]
- Biased RSA Private Keys: Origin Attribution of GCD-Factorable KeysAdam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas. 505-524 [doi]
- MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC ComputationRobert Künnemann, Hamed Nemati. 525-545 [doi]
- Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHEAnamaria Costache, Kim Laine, Rachel Player. 546-565 [doi]
- How to Model the Bribery Attack: A Practical Quantification Method in BlockchainHanyi Sun, Na Ruan, Chunhua Su. 569-589 [doi]
- Updatable BlockchainsMichele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros. 590-609 [doi]
- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract ExecutionYang Xiao, Ning Zhang 0017, Jin Li, Wenjing Lou, Y. Thomas Hou. 610-629 [doi]
- Identity-Based Authenticated Encryption with Identity ConfidentialityYunlei Zhao. 633-653 [doi]
- Securing DNSSEC Keys via Threshold ECDSA from Generic MPCAnders P. K. Dalskov, Claudio Orlandi, Marcel Keller, Kris Shrishak, Haya Shulman. 654-673 [doi]
- On Private Information Retrieval Supporting Range QueriesJunichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura. 674-694 [doi]
- 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake SecurelyTuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou. 697-712 [doi]
- Generic Superlight Client for Permissionless BlockchainsYuan Lu, Qiang Tang 0005, Guiling Wang. 713-733 [doi]
- LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and ProfitAhmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac. 734-755 [doi]