Accepted Papers in the first round
Not So Secure TSC
Jonas Juffinger (Graz University of Technology)
Sudheendra Raghav Neela (Graz University of Technology)
Daniel Gruss (Graz University of Technology)
Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data
Leonardo Neumann (UNICAMP)
Antonio Guimarães (IMDEA Software Institute)
Diego F. Aranha (Aarhus University)
Edson Borin (UNICAMP)
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations
Denis Donadel (University of Padua)
Kavya Balasubramanian (University of Washington)
Bhaskar Ramasubramanian (Western Washington University)
Mauro Conti (University of Padua)
Radha Poovendran (University of Washington)
Privately Compute the Item with Maximal Weight Sum in Set Intersection
Hongyuan Cai (Tsinghua University)
Xiaodong Wang (Tsinghua University)
Zijie Lu (Beijing Institute of Mathematical Sciences and Applications)
Bei Liang (Beijing Institute of Mathematical Sciences and Applications)
Oblivious suffix sorting: A multi-party computation scheme for secure and efficient suffix sorting
Kota Isayama (SMBC Nikko Securities Inc.)
Koki Jimbo (Tokyo University of Science)
Naohiro Okamoto (The University of Tokyo)
Kunihiko Sadakane (The University of Tokyo)
Kazunari Tozawa (The University of Tokyo)
Optimal Communication Unbalanced Private Set Union
Alexis Galan (Université Grenoble Alpes)
Jean-Guillaume Dumas (Université Grenoble Alpes)
Aude Maignan (Université Grenoble Alpes)
Bruno Grenet (Université Grenoble Alpes)
Daniel S. Roche (United States Naval Academy)
Security Analysis of Forward Secure Log Sealing in Journald
Astrid Ottenhues (Karlsruhe Institute of Technology)
Felix Dörre (Karlsruhe Institute of Technology)
Generic Security of GCM-SST
Akiko Inoue (NEC)
Ashwin Jha (Ruhr-Universität Bochum)
Bart Mennink (Radboud University Nijmegen)
Kazuhiko Minematsu (NEC)
G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels
Britney Bourassa (University of North Carolina at Chapel Hill)
Yan Michalevsky (Spacecoin.xyz)
Saba Eskandarian (University of North Carolina at Chapel Hill)
Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing
Enrico Bassetti (TU Delft)
Edoardo Di Paolo (Sapienza Universita di Roma)
Francesco Drago (University of Padua)
Mauro Conti (University of Padua & Delft University of Technology)
Angelo Spognardi (Sapienza Universita di Roma)
HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts
Jens-Rene Giesen (University of Duisburg-Essen)
Sebastien Andreina (NEC Laboratories Europe)
Michael Rodler (Amazon Web Services)
Ghassan Karame (Ruhr University Bochum)
Lucas Davi (University of Duisburg-Essen)
SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation
Fuyi Wang (Deakin University)
Jinzhi Ouyang (Xiamen University)
Leo Yu Zhang (Griffith University)
Lei Pan (Deakin University)
Shengshan Hu (Huazhong University of Science and Technology)
Robin Doss (Deakin University)
Jianying Zhou (Singapore University of Technology and Design)
SoK: Continuous User Authentication Beyond Error Rates: Reviewing General System Properties
Florian Dehling (Justus Liebig University Giessen)
Sebastian Kawelke (L3montree Cybersecurity)
Luigi Lo Iacono (Justus Liebig University Giessen)
Negative Results on Information-theoretic Additive Randomized Encodings
Keitaro Hiwatashi (National Institute of Advanced Industrial Science and Technology (AIST))
TAU: Trust via Asynchronous Updates for Satellite Network Resiliency
Quincy Bayer (University of Pittsburgh)
Robert Esswein (University of Pittsburgh)
Samuel Mergendahl (MIT Lincoln Laboratory)
Jonathan Ruffley (Naval Nuclear Laboratory)
Mai Abdelhakim (University of Pittsburgh)
Robert K Cunningham (University of Pittsburgh)
Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment
Xiangyu Su (Institute of Science Tokyo)
Xavier Defago (Institute of Science Tokyo)
Mario Larangeira (Institute of Science Tokyo, Input Output Global)
Kazuyuki Mori (Mitsubishi Electric Corporation)
Takuya Oda (Institute of Science Tokyo, The University of Kitakyushu)
Yasumasa Tamura (Institute of Science Tokyo, Hokkaido University)
Keisuke Tanaka (Institute of Science Tokyo)
Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization
Guirec Lebrun (Ecole Normale Supérieure – PSL, ANSSI)
Céline Chevalier (Université Panthéon-Assas, Ecole Normale Supérieure – PSL)
Ange Martinelli (ANSSI)
Distributed Asynchronous Remote Key Generation
Hugo Nartz (Forschungsinstitut CODE @ Universität der Bundeswehr München)
Mark Manulis (Universität der Bundeswehr München)
Two-party ECDSA with JavaCard-based smartcards
Antonin Dufka (Masaryk University)
Peeter Laud (Cybernetica AS)
Petr Svenda (Masaryk University)
Share&Shrink: Efficient and Delegatable MPC in one Broadcast then Asynchrony
Antoine Urban (Telecom Paris, Institut polytechnique de Paris)
Matthieu Rambaud (Telecom Paris, Institut Polytechnique Paris)
Registered Matchmaking Encryption
Danilo Francati (Royal Holloway, University of London)
Valeria Huang (Sapienza University of Rome)
Daniele Venturi (Sapienza University of Rome)
Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors
Sarah Miracle (University of St. Thomas)
Scott Yilek (University of St. Thomas)
OCEAN: Open-World Contrastive Authorship Identification
Felix Mächtle (Universität zu Lübeck)
Jan-Niclas Serr (Universität zu Lübeck)
Nils Loose (Universität zu Lübeck)
Jonas Sander (Universität zu Lübeck)
Thomas Eisenbarth (Universität zu Lübeck)
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach
Giacomo Benedetti (University of Genoa)
Serena Cofano (IMT School for Advanced Studies Lucca & University of Genoa)
Alessandro Brighente (University of Padua)
Mauro Conti (University of Padua & Delft University of Technology)
PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks
Mahdi Rahimi (KU Leuven)
LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks
Yongjie Xu (ShanghaiTech University)
Guangke Chen (Pengcheng Laboratory)
Fu Song (Chinese Academy of Sciences & Nanjing Institute of Software Technology)
Yuqi Chen (ShanghaiTech University)
Delayed-Input Multi-Party Computation
Michele Ciampi (The University of Edinburgh)
Jure Sternad (Aarhus University)
Yu Xia (The University of Edinburgh)
Algebraic Zero Knowledge Contingent Payment
Javier Gomez-Martinez (IMDEA Software Institute, Universidad Politécnica de Madrid)
Dimitrios Vasilopoulos (Independent Researcher)
Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research)
Dario Fiore (IMDEA Software Institute)
Decompose and conquer: ZVP attacks on GLV curves
Vojtech Suchanek (Masaryk University)
Vladimir Sedlacek (Rutgers University)
Marek Sys (Masaryk University)
Anonymous Authenticated Key Exchange
Jose Ignacio Escribano Pablos (GuardedBox)
Maria Isabel González Vasco (Universidad Carlos III de Madrid)
Ángel Luis Pérez del Pozo (Universidad Rey Juan Carlos)
Claudio Soriente (NEC Laboratories Europe)
Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO
Yan Li (Tsinghua University)
Zhenrui Zhang (Tsinghua University)
Zhiyu Lang (Tsinghua University)
Xiang Li (Nankai University)
Jia Zhang (Tsinghua University)
Donghong Sun (Tsinghua University)
Accepted Papers in the second round
MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion
Huifeng Li (Nanjing University of Science & Technology)
Qianmu Li (Nanjing University of Science & Technology)
Yingquan Chen (Nanjing University of Science & Technology)
Qing Chang (Nanjing University of Science & Technology)
Xiaocong Wu (Nanjing University of Science & Technology)
ProvDP: Differential Privacy for System Provenance Dataset
Kunal Mukherjee (The University of Texas at Dallas)
Jonathan Yu
Partha De (The University of Texas at Dallas)
Dinil Mon Divakaran (A*STAR Institute for Infocomm Research)
On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme
Benoit Libert (Zama)
Thomas Peters (UCLouvain and FNRS)
A New Quadratic Noisy Functional Encryption Scheme and Its Application for Privacy Preserving Machine Learning
Jasmin Zalonis (University of Mannheim)
Linda Scheu-Hachtel (University of Mannheim)
Frederik Armknecht (University of Mannheim)
Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes
Sathvika Balumuri (National Research Council Canada)
Edward Eaton (National Research Council Canada)
Philippe Lamontagne (National Research Council Canada and Université de Montréal)
Revisiting the attacker’s knowledge in inference attacks against Searchable Symmetric Encryption
Marc Damie (University of Twente / Inria)
Jean-Benoist Leger (Université de Technologie de Compiègne / Université Paris-Saclay, AgroParisTech, INRAE, UMR MIA Paris-Saclay)
Florian Hahn (University of Twente)
Andreas Peter (Carl von Ossietzky Universität Oldenburg)
Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices
Hirotomo Shinoki (Hitachi, Ltd.)
Hisayoshi Sato (Hitachi, Ltd.)
Masayuki Yoshino (Hitachi, Ltd.)
AQQUA: Augmenting Quisquis with Auditability
Georgios Papadoulis (National Technical University of Athens and Archimedes, Athena Research Center)
Danai Balla (National Technical University of Athens and Archimedes, Athena Research Center)
Panagiotis Grontas (National Technical University of Athens and Archimedes, Athena Research Center)
Aris Pagourtzis (National Technical University of Athens and Archimedes, Athena Research Center)
Everlasting Fully Dynamic Group Signatures
Yimeng He (Nanyang Technological University)
San Ling (Nanyang Technological University)
Khai Hanh Tang (Nanyang Technological University)
Huaxiong Wang (Nanyang Technological University)
Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor
Naoki Shimoe (University of Tsukuba)
Noboru Kunihiro (University of Tsukuba)
FNSA: An Adaptive Privacy Protection Model for Trajectory Data
Jin Shang (Nanjing University of Aeronautics and Astronautics)
Zhengyou Xia (Nanjing University of Aeronautics and Astronautics)
Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework
Paula Arnold (University of Lübeck)
Sebastian Berndt (Technische Hochschule Lübeck)
Jörn Müller-Quade (Karlsruhe Institute of Technology (KIT), KASTEL Security Research Labs)
Astrid Ottenhues (Karlsruhe Institute of Technology (KIT), KASTEL Security Research Labs)
Cancelable Biometrics based on Cosine Locality Sensitive Hashing and Grouped Inner Product Transformation for Real-valued Features
Ruoqi Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense)
Yulin Ni (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense)
Peisong Shen (Institute of Information Engineering, Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense)
Xue Tian (Institute of Information Engineering, Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense)
Yuepeng E (Institute of Information Engineering, Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense)
SPPM: A Stackelberg Game-based Personalized Privacy-Preserving Model in Mobile Crowdsensing Systems
Jinhui Jiao (Nanjing University of Aeronautics and Astronautics)
Zhengyou Xia (Nanjing University of Aeronautics and Astronautics)
SoK: Measuring Blockchain Decentralization
Christina Ovezik (University of Edinburgh)
Dimitris Karakostas (University of Edinburgh)
Mary Milad (University of Edinburgh)
Daniel W Woods (University of Edinburgh)
Aggelos Kiayias (University of Edinburgh and IOG)
Pre-Constructed Publicly Verifiable Secret Sharing and Applications
Karim Baghery (COSIC, KU Leuven)
Noah Knapen (COSIC, KU Leuven)
Georgio Nicolas (COSIC, KU Leuven)
Mahdi Rahimi (COSIC, KU Leuven)
On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers
Emanuele Bellini (Technology Innovation Institute)
Mohamed Rachidi (Technology Innovation Institute)
Raghvendra Rohit (Indian Institute of Technology Roorkee)
Sharwan K. Tiwari (Technology Innovation Institute)
Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols
Patrik Keller (University of Innsbruck)
Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning
Donggeun Kwon (Korea University)
Deukjo Hong (Jeonbuk National University)
Jaechul Sung (University of Seoul)
Seokhie Hong (Korea University)
From ElGamal to Lattice-Based: Enhancing the Helios Voting System with Quantum-Safe Cryptography
João Pedro Cardoso Barbosa (Universidade Federal de Santa Catarina)
Gustavo Zambonin (Universidade Federal de Santa Catarina)
Thaís Bardini Idalino (Universidade Federal de Santa Catarina)
Ricardo Custódio (Universidade Federal de Santa Catarina)
Sassafras: Efficient Batch Single Leader Election
Jeffrey Burdges (Web3 Foundation)
Elizabeth Crites (Web3 Foundation)
Handan Kılınç Alper (=nil; Foundation)
Alistair Stewart (Web3 Foundation)
Sergey Vasilyev (Web3 Foundation)
Post-Quantum Cryptography for Linux File System Integrity
Johannes Wiesböck (Fraunhofer Institute for Applied and Integrated Security)
Maximiliane Münch (Technical University of Munich)
Michael Weiß (Fraunhofer Institute for Applied and Integrated Security)
Tighter provable security for TreeKEM
Karen Azari (University of Vienna)
Andreas Ellison (ETH Zürich)
Obfuscation for Deep Neural Networks against Model-based Extraction Attacks: Taxonomy and Optimization
Yulian Sun (Huawei Technologies Duesseldorf)
Vedant Bonde (Huawei Technologies Duesseldorf)
Li Duan (Huawei Technologies Duesseldorf)
Yong Li (Huawei Technologies Duesseldorf)