20th International Conference on
Applied Cryptography and Network Security
List of accepted Papers
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
Merve Sahin, Cedric Hebert and Rocio Cabrera Lozoya
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
Prakash Shrestha and Nitesh Saxena
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato, Keita Emura and Atsushi Takayasu
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
Loïc Ferreira
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Alisa Pankova and Jan Willemson
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia and Aanjhan Ranganathan
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
Arush Chhatrapati, Susan Hohenberger, James Trombo and Satyanarayana Vusirikala
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng and Limin Sun
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
Liang Zhao, Ze Chen, Liqun Chen and Xinyi Huang
Improved Differential-Linear Attack with Application to Round-reduced Speck32/64
Feifan Wang and Gaoli Wang
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking
Leo Robert, Pascal Lafourcade, Cristina Onete, Pierre-Alain Fouque, Thibaut Jacques, Ghada Arfaoui and Adina Nedelcu
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
Antonin Leroux, Karim Eldefrawy and Tancrede Lepoint
FAST: Fair Auctions via Secret Transactions
Bernardo David, Lorenzo Gentile and Mohsen Pourpouneh
Passive query-recovery attack against secure conjunctive keyword search schemes
Marco Dijkslag, Marc Damie, Florian Hahn and Andreas Peter
Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques
Zengrui Liu, Prakash Shrestha and Nitesh Saxena
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer and Andreas Peter
RSA Key Recovery from Digit Equivalence Information
Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim and Yuval Yarom
Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE)
Tsz Hon Yuen, Cong Zhang and Sherman S. M. Chow
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason Hwei Ming Ying, Shuwei Cao, Geong Sen Poh, Jia Xu and Hoon Wei Lim
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
Kittiphop Phalakarn, Nuttapong Attrapadung and Kanta Matsuura
How Byzantine is a Send Corruption?
Karim Eldefrawy, Julian Loss and Benjamin Terner
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue, Tetsu Iwata and Kazuhiko Minematsu
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher
Norica Bacuieti, Lejla Batina and Stjepan Picek
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security
Saikrishna Badrinarayanan, Daniel Masny and Pratyay Mukherjee
Post-Quantum ID-based Ring Signatures from Symmetric-key primitives
Maxime Buser, Joseph Liu, Amin Sakzad and Ron Steinfeld
Progressive and Efficient Verification for Digital Signatures
Cecilia Boschini, Dario Fiore and Elena Pagnin
Revocable Hierarchical Attribute-based Signatures from Lattices
Daniel Gardham and Mark Manulis
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators
Florette Martinez
Carry-Less to BIKE Faster
Markus Krausz, Jan Thoma, Ming-Shing Chen and Tim Güneysu
Covert Authentication from Lattices
Rajendra Kumar and Khoa Nguyen
A White-Box Speck Implementation using Self-Equivalence Encodings
Joachim Vandersmissen, Adrián Ranea and Bart Preneel
Babel Fees via Limited Liabilities
Manuel Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones and Polina Vinogradova
Improving the Privacy of Tor Onion Services
Edward Eaton, Sajin Sasy and Ian Goldberg
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy
Mingyu Liang, Dov Gordon, Jonathan Katz and Jiayu Xu
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza and Jean-Pierre Hubaux
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe and Hannes Federrath
Astrape: Anonymous Payment Channels with Boring Cryptography
Yuhao Dong, Ian Goldberg, Sergey Gorbunov and Raouf Boutaba
(Commit-and-Prove) Predictable Arguments with Privacy
Hamidreza Khoshakhlagh
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hosein Hadipour and Maria Eichlseder
Efficient Two-party Exponentiation from Quotient Transfer
Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob Schuldt and Keisuke Tanaka
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli and Benjamin Smith
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther, Simon Rastikian, Patrick Towa and Thom Wiggers
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Thomas Attema, Vincent Dunning, Maarten Everts and Peter Langenkamp
Faster Kyber and Dilithium on the Cortex-M4
Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer and Daan Sprenkels