Abstract is missing.
- Machine Learning Based Hardware Trojan Detection Using Electromagnetic EmanationJunko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly. 3-19 [doi]
- A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal SystemsDongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu 0005, Zhen Xu. 20-35 [doi]
- Detection of Metamorphic Malware Packers Using Multilayered LSTM NetworksErik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss. 36-53 [doi]
- Profile Matching Across Online Social NetworksAnisa Halimi, Erman Ayday. 54-70 [doi]
- A Compact Digital Signature Scheme Based on the Module-LWR ProblemHiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. 73-90 [doi]
- Tree-Based Ring-LWE Group Key Exchanges with Logarithmic ComplexityHector B. Hougaard, Atsuko Miyaji. 91-106 [doi]
- CoinBot: A Covert Botnet in the Cryptocurrency NetworkJie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang. 107-125 [doi]
- A Symbolic Model for Systematically Analyzing TEE-Based ProtocolsShiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang. 126-144 [doi]
- New Practical Public-Key Deniable EncryptionYanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen 0001. 147-163 [doi]
- A Blockchain Traceable Scheme with Oversight FunctionTianjun Ma, Haixia Xu, Peili Li. 164-182 [doi]
- Blind Functional EncryptionSébastien Canard, Adel Hamdi, Fabien Laguillaumie. 183-201 [doi]
- Lattice HIBE with Faster Trapdoor Delegation and ApplicationsGuoFeng Tang, Tian Qiu. 202-220 [doi]
- Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) AppNissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley. 223-242 [doi]
- rTLS: Lightweight TLS Session Resumption for Constrained IoT DevicesKoen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni. 243-258 [doi]
- PiDicators: An Efficient Artifact to Detect Various VMsQingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia. 259-275 [doi]
- HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA AcceleratorLuis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh. 276-291 [doi]
- Information-Theoretic Security of Cryptographic ChannelsMarc Fischlin, Felix Günther 0001, Philipp Muth. 295-311 [doi]
- Client-Oblivious OPRAMGareth T. Davies, Christian Janson, Daniel P. Martin 0001. 312-330 [doi]
- The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption FailuresGeorg Maringer, Tim Fritzmann, Johanna Sepúlveda. 331-349 [doi]
- One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on CloudYifei Chen, Meng Li 0006, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti. 350-365 [doi]
- A New General Method of Searching for Cubes in Cube AttacksLin Ding 0001, Lei Wang 0031, Dawu Gu, Chenhui Jin, Jie Guan. 369-385 [doi]
- A Love Affair Between Bias Amplifiers and Broken Noise SourcesGeorge Teseleanu. 386-402 [doi]
- Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic EncryptionMartin Zuber, Sergiu Carpov, Renaud Sirdey. 403-421 [doi]
- A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang. 422-440 [doi]
- Statically Dissecting Internet of Things Malware: Analysis, Characterization, and DetectionAfsah Anwar, Hisham Alasmary, Jeman Park 0001, An Wang 0002, Songqing Chen, David A. Mohaisen. 443-461 [doi]
- Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service AttacksFlorian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli. 462-478 [doi]
- A Variational Generative Network Based Network Threat Situation AssessmentHongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang. 479-491 [doi]
- A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on MicrocontrollersSebastian Renner, Enrico Pozzobon, Jürgen Mottok. 495-509 [doi]
- Experimental Comparisons of Verifiable Delay FunctionsZihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang 0002. 510-527 [doi]
- Attacks on Integer-RLWEAlessandro Budroni, Benjamin Chetioui, Ermes Franch. 528-542 [doi]
- A Family of Subfield Hyperelliptic Curves for Use in CryptographyAnindya Ganguly, Abhijit Das 0004, Dipanwita Roy Chowdhury, Deval Mehta. 543-561 [doi]
- Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval ModelLinru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu. 565-587 [doi]
- Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet TreeKaiming Chen, Jiageng Chen. 588-605 [doi]