Abstract is missing.
- Security Analysis of Improved EDHOC ProtocolBaptiste Cottier, David Pointcheval. 3-18 [doi]
- A Survey on Identity-Based Blind SignatureMirko Koscina, Pascal Lafourcade 0001, Gael Marcadet, Charles Olivier-Anclin, Léo Robert. 19-37 [doi]
- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AESMartin Brisfors, Michail Moraitis, Elena Dubrova. 38-53 [doi]
- Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey ZoneSlim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. 54-70 [doi]
- A New Class of Trapdoor Verifiable Delay FunctionsAhmed Zawia, M. Anwar Hasan. 71-87 [doi]
- Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with ApplicationsAdda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas de Souza. 88-103 [doi]
- Towards a Maturity Model for Crypto-Agility AssessmentJulian Hohm, Andreas Heinemann, Alexander Wiesmaier. 104-119 [doi]
- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-DistinguisherAmirhossein Ebrahimi, Francesco Regazzoni 0001, Paolo Palmieri 0001. 123-141 [doi]
- Data-Driven Evaluation of Intrusion Detectors: A Methodological FrameworkSolayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil. 142-157 [doi]
- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face SpotterMuhammad Mohzary, Khalid J. Almalki, Baek-Young Choi, Sejun Song. 158-172 [doi]
- Where is the Virtual Machine Within Cpython?Guillaume Bonfante, Anuyan Ithayakumar. 175-191 [doi]
- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile NetworksDaniel Fraunholz, Dominik Brunke, Lorenz Dumanski, Hartmut König. 192-207 [doi]
- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection AlgorithmsOlivier de Casanove, Florence Sèdes. 208-220 [doi]
- A Taxonomy and Gap-Analysis in Digital Privacy EducationSumit Kumar Paul, D. A. Knox. 221-235 [doi]
- Differentially Private Friends RecommendationKamalkumar Macwan, Abdessamad Imine, Michaël Rusinowitch. 236-251 [doi]
- Underwater Confidential Communications in JANUSYannick Beaupré, Michel Barbeau, Stéphane Blouin. 255-270 [doi]
- Defense Models for Data Recovery in Industrial Control SystemsAlvi Jawad, Jason Jaskolka. 271-286 [doi]
- SCADA Radio Blackbox Reverse EngineeringJean-Benoit Larouche, Sébastien Roy 0002, Frédéric Mailhot 0001, Pierre-Martin Tardif, Marc Frappier. 287-302 [doi]
- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart ContractsPuneet Gill, Indrani Ray, Alireza Lotfi Takami, Mahesh Tripunitara. 305-321 [doi]
- Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart ContractsSahar Salimpour, Farhad Keramat, Jorge Peña Queralta, Tomi Westerlund. 322-337 [doi]
- Money Transfer on Transaction Signature-Based LedgerMomoko Shiraishi, Hitoshi Aida. 338-354 [doi]
- A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency WalletsThierry Sans, Ziming Liu, Kevin Oh. 355-370 [doi]
- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart HomesAnthony Tam, Furkan Alaca, David Barrera 0003. 373-388 [doi]
- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time PasswordsKonrad-Felix Krentz, Thiemo Voigt. 389-405 [doi]
- Towards Characterizing IoT Software Update PracticesConner Bradley, David Barrera 0003. 406-422 [doi]
- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network TrafficOmar Tahmi, Chamseddine Talhi, Yacine Challal. 423-440 [doi]
- A Decision-Support Tool for Experimentation on Zero-Hour Phishing DetectionPavlo Burda, Luca Allodi, Nicola Zannone. 443-452 [doi]
- Deep-Learning-Based Vulnerability Detection in Binary ExecutablesAndreas Schaad, Dominik Binder. 453-460 [doi]
- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential CryptanalysisShah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal 0001, Atiya Hai. 461-471 [doi]