20th International Conference on
Applied Cryptography and Network Security

List of accepted Papers

  • An Approach to Generate Realistic HTTP Parameters for Application Layer Deception

    • Merve Sahin, Cedric Hebert and Rocio Cabrera Lozoya

  • Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication

    • Prakash Shrestha and Nitesh Saxena

  • Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation

    • Shingo Sato, Keita Emura and Atsushi Takayasu

  • Privacy-Preserving Authenticated Key Exchange for Constrained Devices

    • Loïc Ferreira

  • Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols

    • Alisa Pankova and Jan Willemson

  • ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes

    • Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia and Aanjhan Ranganathan

  • A Performance Evaluation of Pairing-Based Broadcast Encryption Systems

    • Arush Chhatrapati, Susan Hohenberger, James Trombo and Satyanarayana Vusirikala

  • IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol

    • Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng and Limin Sun

  • An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile

    • Liang Zhao, Ze Chen, Liqun Chen and Xinyi Huang

  • Improved Differential-Linear Attack with Application to Round-reduced Speck32/64

    • Feifan Wang and Gaoli Wang

  • A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking

    • Leo Robert, Pascal Lafourcade, Cristina Onete, Pierre-Alain Fouque, Thibaut Jacques, Ghada Arfaoui and Adina Nedelcu

  • Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities

    • Antonin Leroux, Karim Eldefrawy and Tancrede Lepoint

  • FAST: Fair Auctions via Secret Transactions

    • Bernardo David, Lorenzo Gentile and Mohsen Pourpouneh

  • Passive query-recovery attack against secure conjunctive keyword search schemes

    • Marco Dijkslag, Marc Damie, Florian Hahn and Andreas Peter

  • Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques

    • Zengrui Liu, Prakash Shrestha and Nitesh Saxena

  • Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

    • Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer and Andreas Peter

  • RSA Key Recovery from Digit Equivalence Information

    • Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim and Yuval Yarom

  • Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE)

    • Tsz Hon Yuen, Cong Zhang and Sherman S. M. Chow

  • PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions

    • Jason Hwei Ming Ying, Shuwei Cao, Geong Sen Poh, Jia Xu and Hoon Wei Lim

  • Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA

    • Kittiphop Phalakarn, Nuttapong Attrapadung and Kanta Matsuura

  • How Byzantine is a Send Corruption?

    • Karim Eldefrawy, Julian Loss and Benjamin Terner

  • Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle

    • Akiko Inoue, Tetsu Iwata and Kazuhiko Minematsu

  • Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher

    • Norica Bacuieti, Lejla Batina and Stjepan Picek

  • Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security

    • Saikrishna Badrinarayanan, Daniel Masny and Pratyay Mukherjee

  • Post-Quantum ID-based Ring Signatures from Symmetric-key primitives

    • Maxime Buser, Joseph Liu, Amin Sakzad and Ron Steinfeld

  • Progressive and Efficient Verification for Digital Signatures

    • Cecilia Boschini, Dario Fiore and Elena Pagnin

  • Revocable Hierarchical Attribute-based Signatures from Lattices

    • Daniel Gardham and Mark Manulis

  • Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators

    • Florette Martinez

  • Carry-Less to BIKE Faster

    • Markus Krausz, Jan Thoma, Ming-Shing Chen and Tim Güneysu

  • Covert Authentication from Lattices

    • Rajendra Kumar and Khoa Nguyen

  • A White-Box Speck Implementation using Self-Equivalence Encodings

    • Joachim Vandersmissen, Adrián Ranea and Bart Preneel

  • Babel Fees via Limited Liabilities

    • Manuel Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones and Polina Vinogradova

  • Improving the Privacy of Tor Onion Services

    • Edward Eaton, Sajin Sasy and Ian Goldberg

  • Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy

    • Mingyu Liang, Dov Gordon, Jonathan Katz and Jiayu Xu

  • Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation

    • Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza and Jean-Pierre Hubaux

  • Probing for Passwords – Privacy Implications of SSIDs in Probe Requests

    • Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe and Hannes Federrath

  • Astrape: Anonymous Payment Channels with Boring Cryptography

    • Yuhao Dong, Ian Goldberg, Sergey Gorbunov and Raouf Boutaba

  • (Commit-and-Prove) Predictable Arguments with Privacy

    • Hamidreza Khoshakhlagh

  • Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges

    • Hosein Hadipour and Maria Eichlseder

  • Efficient Two-party Exponentiation from Quotient Transfer

    • Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob Schuldt and Keisuke Tanaka

  • Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices

    • Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli and Benjamin Smith

  • KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip

    • Felix Günther, Simon Rastikian, Patrick Towa and Thom Wiggers

  • Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC

    • Thomas Attema, Vincent Dunning, Maarten Everts and Peter Langenkamp

  • Faster Kyber and Dilithium on the Cortex-M4

    • Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer and Daan Sprenkels