Preliminary Program of ACNS 2025
Day 1 (Monday, June 23rd)
08:15-08:50 | Registration |
08:50-09:00 | Opening remarks |
09:00-10:20 | Session: Encryption & Secret Sharing 1. Registered Matchmaking Encryption D. Francati, V. Huang, D. Venturi 2. Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors S. Miracle, S. Yilek 3. Fully Secure Searchable Encryption from PRFs H. Shinoki, H. Sato, M. Yoshino 4. Pre-Constructed Publicly Verifiable Secret Sharing and Applications K. Baghery, N. Knapen, G. Nicolas, M. Rahimi |
10:20-11:00 | Coffee break |
11:00-12:40 | Session: Blockchains & Decentralized Systems 1. HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts J. Giesen, S. Andreina, M. Rodler, G. Karame, L. Davi 2. Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment X. Su, X. Defago, M. Larangeira, K. Mori, T. Oda, Y. Tamura, K. Tanaka 3. SoK: Measuring Blockchain Decentralization C. Ovezik, D. Karakostas, M. Milad, D. Woods, A. Kiayias 4. Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols P. Keller 5. Sassafras: Efficient Batch Single Leader Election J. Burdges, E. Crites, H. Alper, A. Stewart, S. Vasilyev |
12:40-14:00 | Lunch |
14:00-15:20 | Session: MPC 1. Oblivious suffix sorting: A multi-party computation scheme for secure and efficient suffix sorting K. Isayama, K. Jimbo, N. Okamoto, K. Sadakane, K. Tozawa 2. Share&Shrink: Efficient and Delegatable MPC in one Broadcast then Asynchrony A. Urban, M. Rambaud 3. Delayed-Input Multi-Party Computation M. Ciampi, J. Sternad, Y. Xia 4. Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes S. Balumuri, E. Eaton, P. Lamontagne |
15:20-16:00 | Coffee break |
16:00-17:00 | Keynote: Bart Preneel |
17:00-20:00 | Poster & Networking Session |
Day 2 (Tuesday, June 24th)
09:00-10:00 | Keynote: Shweta Shinde, incl. 5min room switching | |||
10:00-10:40 | Session: Network Security 1. Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing E. Bassetti, E. Di Paolo, F. Drago, M. Conti, A. Spognardi 2. TAU: Trust via Asynchronous Updates for Satellite Network Resiliency Q. Bayer, R. Esswein, S. Mergendahl, J. Ruffley, M. Abdelhakim, R. Cunningham | SPIQE | PrivCrypt | CrossFyre |
10:40-11:00 | Coffee break | |||
11:00-12:40 | Session: Cryptographic primitives and protocols 1. Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization G. Lebrun, C. Chevalier, A. Martinelli 2. Distributed Asynchronous Remote Key Generation H. Nartz, M. Manulis 3. Anonymous Authenticated Key Exchange J. Pablos, M. Vasco, Á. Pozo, C. Soriente 4. Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor N. Shimoe, N. Kunihiro 5. Tighter provable security for TreeKEM K. Azari, A. Ellison | SPIQE | PrivCrypt | CrossFyre |
12:40-14:00 | Lunch | |||
14:00-15:20 | Session: Side Channels 1. Not So Secure TSC J. Juffinger, S. Neela, D. Gruss 2. G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels B. Bourassa, Y. Michalevsky, S. Eskandarian 3. Decompose and conquer: ZVP attacks on GLV curves V. Suchanek, V. Sedlacek, M. Sys 4. Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO Y. Li, Z. Zhang, Z. Lang, X. Li, J. Zhang, D. Sun | SPIQE | PrivCrypt | CrossFyre |
15:20-16:00 | Coffee break | |||
16:00-17:20 | Session: Information Security 1. Optimal Communication Unbalanced Private Set Union A. Galan, J. Dumas, A. Maignan, B. Grenet, D. Roche 2. Negative Results on Information-theoretic Additive Randomized Encodings K. Hiwatashi 3. Two-party ECDSA with JavaCard-based smartcards A. Dufka, P. Laud, P. Svenda 4. MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion H. Li, Q. Li, Y. Chen, Q. Chang, X. Wu | SPIQE | PrivCrypt | CrossFyre |
Day 3 (Wednesday, June 25th)
09:00-10:20 | Session: Privacy & Anonymity 1. Privately Compute the Item with Maximal Weight Sum in Set Intersection H. Cai, X. Wang, Z. Lu, B. Liang 2. Algebraic Zero Knowledge Contingent Payment J. Gomez-Martinez, D. Vasilopoulos, P. Moreno-Sanchez, D. Fiore 3. On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme B. Libert, T. Peters 4. AQQUA: Augmenting Quisquis with Auditability G. Papadoulis, D. Balla, P. Grontas, A. Pagourtzis | AIHWS | SCI | QSHC |
10:20-11:10 | Coffee break | |||
11:10-12:30 | Session: Cryptanalysis 1. Security Analysis of Forward Secure Log Sealing in Journald A. Ottenhues, F. Dörre 2. Generic Security of GCM-SST A. Inoue, A. Jha, B. Mennink, K. Minematsu 3. Revisiting the attacker’s knowledge in inference attacks against Searchable Symmetric Encryption M. Damie, J. Leger, F. Hahn, A. Peter 4. On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers E. Bellini, M. Rachidi, R. Rohit, S. Tiwari | AIHWS | SCI | QSHC |
12:30-14:00 | Lunch | |||
14:00-15:20 | Session: Attacks & Vulnerabilities 1. CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations D. Donadel, K. Balasubramanian, A. Brighente, B. Ramasubramanian, M. Conti, R. Poovendran 2. OCEAN: Open-World Contrastive Authorship Identification F. Mächtle, J. Serr, N. Loose, J. Sander, T. Eisenbarth 3. The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach G. Benedetti, S. Cofano, A. Brighente, M. Conti 4. Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework P. Arnold, S. Berndt, J. Müller-Quade, A. Ottenhues | AIHWS | SCI | QSHC |
15:20-16:00 | Coffee break | |||
16:00-17:00 | Session: Quantum & Post-Quantum 1. Everlasting Fully Dynamic Group Signatures Y. He, S. Ling, K. Tang, H. Wang 2. From ElGamal to Lattice-Based: Enhancing the Helios Voting System with Quantum-Safe Cryptography J. Cardoso Barbosa, G. Zambonin, T. Bardini Idalino, R. Custódio 3. Post-Quantum Cryptography for Linux File System Integrity J. Wiesböck, M. Münch, M. Weiß | AIHWS | SCI | QSHC |
17:00-17:30 | Awards | |||
19:00-22:00 | Conference Dinner at Löwenbräukeller |
Day 4 (Thursday, June 26th)
09:30-10:30 | Session: Biometrics & Authentication 1. SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation F. Wang, J. Ouyang, L. Zhang, L. Pan, S. Hu, R. Doss, J. Zhou 2. SoK: Continuous User Authentication Beyond Error Rates: Reviewing General System Properties F. Dehling, S. Kawelke, L. Iacono 3. Cancelable Biometrics based on Cosine Locality Sensitive Hashing and Grouped Inner Product Transformation for Real-valued Features R. Zhang, Y. Ni, P. Shen, X. Tian, Y. E | CIMSS | SiMLA |
10:30-11:00 | Coffee break | ||
11:00-12:40 | Session: Privacy 1. PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks M. Rahimi 2. ProvDP: Differential Privacy for System Provenance Dataset K. Mukherjee, J. Yu, P. De, D. Divakaran 3. A New Quadratic Noisy Functional Encryption Scheme and Its Application for Privacy Preserving Machine Learning J. Zalonis, L. Scheu-Hachtel, F. Armknecht 4. FNSA: An Adaptive Privacy Protection Model for Trajectory Data J. Shang, Z. Xia 5. SPPM: A Stackelberg Game-based Personalized Privacy-Preserving Model in Mobile Crowdsensing Systems J. Jiao, Z. Xia | CIMSS | SiMLA |
12:40-14:00 | Lunch | ||
14:00-15:20 | Session: Machine Learning 1. Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data L. Neumann, A. Guimarães, D. Aranha, E. Borin 2. LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks Y. Xu, G. Chen, F. Song, Y. Chen 3. Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning D. Kwon, D. Hong, J. Sung, S. Hong 4. Obfuscation for Deep Neural Networks against Model-based Extraction Attacks: Taxonomy and Optimization Y. Sun, V. Bonde, L. Duan, Y. Li | AIoTS | |
15:20-15:30 | Closing remarks |