Abstract is missing.
- SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMAYaxin Cui, Hong Xu, Lin Tan 0003, Wenfeng Qi. 3-18 [doi]
- Improved Related-Key Rectangle Attack Against the Full AES-192Xuanyu Liang, Yincen Chen, Ling Song 0001, Qianqian Yang, Zhuohui Feng, Tianrong Huang. 19-34 [doi]
- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBMSijia Liu, Min Luo 0002, Cong Peng 0005, Debiao He. 35-50 [doi]
- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block CipherJiqiang Lu, Can Wang. 51-68 [doi]
- PAE: Towards More Efficient and BBB-Secure AE from a Single Public PermutationArghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List. 69-87 [doi]
- A Polynomial-Time Attack on G2SIDHGuoqing Zhou, MaoZhi Xu. 91-109 [doi]
- Improvements of Homomorphic Secure Evaluation of Inverse Square RootHongyuan Qu, Guangwu Xu. 110-127 [doi]
- Oblivious Transfer from Rerandomizable PKEShuaishuai Li, Cong Zhang, Dongdai Lin. 128-145 [doi]
- Forward Secure Lattice-Based Ring Signature Scheme in the Standard ModelXiaoling Yu, Yuntao Wang. 146-158 [doi]
- Secure Multi-party Computation with Legally-Enforceable FairnessTakeshi Nakai, Kazumasa Shinagawa. 161-178 [doi]
- On-Demand Allocation of Cryptographic Computing Resource with Load PredictionXiaogang Cao, FengHua Li, Kui Geng, Yingke Xie, Wenlong Kou. 179-196 [doi]
- Private Message Franking with After Opening PrivacyIraklis Leontiadis, Serge Vaudenay. 197-214 [doi]
- Semi-Honest 2-Party Faithful Truncation from Two-Bit ExtractionHuan Zou, Yuting Xiao, Rui Zhang. 215-234 [doi]
- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold CryptographyAmirreza Hamidi, Hossein Ghodosi. 235-246 [doi]
- PiXi: Password Inspiration by Exploring InformationShengqian Wang, Amirali Salehi-Abari, Julie Thorpe. 249-266 [doi]
- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris VerificationNingjing Fan, Dongdong Zhao, Hucheng Liao. 267-283 [doi]
- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of ThingsMinqiu Tian, FengHua Li, Kui Geng, Wenlong Kou, Chao Guo. 284-301 [doi]
- BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social NetworksYuting Zuo, Li Xu 0002, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao. 302-313 [doi]
- Link Prediction-Based Multi-Identity Recognition of Darknet VendorsFutai Zou, Yuelin Hu, Wenliang Xu, Yue Wu 0010. 317-332 [doi]
- CryptoMask: Privacy-Preserving Face RecognitionJianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui, Giovanni Russello. 333-350 [doi]
- Efficient Private Multiset ID ProtocolsCong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin. 351-369 [doi]
- Zoomer: A Website Fingerprinting Attack Against Tor Hidden ServicesYuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan. 370-382 [doi]
- An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoVJiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang. 383-395 [doi]
- Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion SensorsSoohyeon Choi, Manar Mohaisen, DaeHun Nyang, David Mohaisen. 399-417 [doi]
- Multi-scale Features Destructive Universal Adversarial PerturbationsHuangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong. 418-434 [doi]
- Pixel-Wise Reconstruction of Private Data in Split Federated LearningHong Huang, Xingyang Li, Wenjian He. 435-450 [doi]
- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance FragmentsXubo Yang, Linsen Li, Yenan Chen. 451-466 [doi]
- Black-Box Fairness Testing with Shadow ModelsWeipeng Jiang, Chao Shen 0001, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao. 467-484 [doi]
- Graph Unlearning Using Knowledge DistillationWenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin. 485-501 [doi]
- AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited SettingsRenYang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou 0011. 502-518 [doi]
- Learning to Detect Deepfakes via Adaptive Attention and Constrained DifferenceLichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen. 519-533 [doi]
- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial RepresentationHewei Yu, Pengfei Shi. 534-549 [doi]
- SCOPE: A Cross-Chain Supervision Scheme for Consortium BlockchainsYuwei Xu, Haoyu Wang, Junyu Zeng. 553-570 [doi]
- Subsidy Bridge: Rewarding Cross-Blockchain Relayers with SubsidyYifu Geng, Bo Qin, Qin Wang 0008, Wenchang Shi, Qianhong Wu. 571-589 [doi]
- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency TransactionsYuhan Song, Yuefei Zhu, Fushan Wei. 590-607 [doi]
- Blockchain Based Publicly Auditable Multi-party Computation with Cheater DetectionShan Jin, Yong Li 0002, Xi Chen 0063, Ruxian Li. 608-626 [doi]
- Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain DecentralisationJohan Hagelskjar Sjursen, Weizhi Meng 0001, Wei-Yang Chiu. 627-644 [doi]
- BDTS: Blockchain-Based Data Trading SystemErya Jiang, Bo Qin, Qin Wang 0008, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang. 645-664 [doi]
- Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer NetworksChang Xu 0004, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang 0001. 665-680 [doi]
- DRoT: A Decentralised Root of Trust for Trusted NetworksLoganathan Parthipan, Liqun Chen 0002, Christopher J. P. Newton, Yunpeng Li, Fei Liu, Donghui Wang. 683-701 [doi]
- Finding Missing Security Operation Bugs via Program Slicing and Differential CheckYeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie, Weiping Wen. 702-718 [doi]
- TimeClave: Oblivious In-Enclave Time Series Processing SystemKassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi. 719-737 [doi]
- Efficient and Appropriate Key Generation Scheme in Different IoT ScenariosHong Zhao, Enting Guo, Chunhua Su, Xinyi Huang 0001. 738-749 [doi]
- A Fake News Detection Method Based on a Multimodal Cooperative Attention NetworkHongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng. 750-760 [doi]