21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
| 19-22 June, 2023
Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao and Xintian Hou |
Formal Verification of Arithmetic Masking in Hardware and Software Barbara Gigerl, Robert Primas and Stefan Mangard |
Robustly Reusable Fuzzy Extractors in a Post-Quantum World Amit Deo and Charles Grover |
Pairings in Rank-1 Constraint System Youssef El Housni |
Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo and Sin G. Teo |
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang and Xiangyong Zeng |
Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS Keitaro Hiwatashi and Koji Nuida |
Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis Cong Tian, Dengpan Ye and Chuanxi Chen |
Forward Security of Fiat-Shamir Lattice Signatures Yang Tao, Rui Zhang and Yunfeng Ji |
Meet-in-the-Filter and Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko and Vesselin Velichkov |
Near Collision Attack against Grain v1 Subhadeep Banik, Daniel Collins and Willi Meier |
Layered Binary Templating Martin Schwarzl, Erik Kraft and Daniel Gruss |
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim and Hsu-Chun Hsiao |
Subversion-Resilient Authenticated Encryption without Random Oracles Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager and Thomas Eisenbarth |
Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits and Denis Varlakov |
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Luke Harmon, Gaetan Delavignette, Arnab Roy and David Silva |
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino and Daniele Venturi |
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions Michele Ciampi and Yu Xia |
A Forkcipher-based Pseudo-Random Number Generator Elena Andreeva and Andreas Weninger |
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access Sebastian Surminski, Christian Niesler, Lucas Davi and Ahmad-Reza Sadeghi |
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty and Sebastian Faust |
TIDAL: Practical Collisions on State-Reduced Keccak Variants Sahiba Suryawanshi, Dhiman Saha and Shashwat Jaiswal |
Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich and Tim Güneysu |
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem T-H. Hubert Chan, Ting Wen, Hao Xie and Quan Xue |
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier and Ruben Niederhagen |
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps I Wayan Budi Sentana, Muhammad Ikram and Mohamed Ali Kaafar |
Analysis and Prevention of Averaging Attacks against Obfuscation Protocols Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra Arnau and Thorsten Strufe |
Practical Robust DKG Protocols for CSIDH Shahla Atapoor, Karim Baghery, Daniele Cozzo and Robi Pedersen |
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua and Sheng Zhong |
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices Eric Sageloli, Pierre Pébereau, Pierrick Méaux and Céline Chevalier |
Efficient Isogeny Proofs Using Generic Techniques Kelong Cong, Yi-Fu Lai and Shai Levin |
Towards Post-Quantum Hash Proof Systems Bénédikt Tran and Serge Vaudenay |
Optimal Security Notion for Decentralized Multi-Client Functional Encryption Ky Nguyen, Duong Hieu Phan and David Pointcheval |
HS-based error correction algorithm for noisy binary GCD side-channel sequences Kenta Tani and Noboru Kunihiro |
Binary Kummer Line Sabyasachi Karati |
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto and Tsuyoshi Takagi |
A New Approach to Garbled Circuits Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay and Avishay Yanai |
Low Memory Attacks on Small Key CSIDH Jesus-Javier Chi-Dominguez, Andre Esser, Sabrina Kunzweiler and Alexander May |
Scored Anonymous Credentials Sherman S. M. Chow, Jack P. K. Ma and Tsz Hon Yuen |
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions Huangting Wu and Sherman S. M. Chow |
Predicate Private Set Intersection With Linear Complexity Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang and Jianying Zhou |
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption Johannes Ernst and Katerina Mitrokotsa |
Efficient Network Representation for GNN-based Intrusion Detection Hamdi Friji, Alexis Olivereau and Mireille Sarkiss |
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset and Mélissa Rossi |
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding Agathe Cheriere, Nicolas Aragon, Tania Richmond and Benoît Gérard |
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim and Frederica Nelson |
Publicly Auditable Functional Encryption Vlasis Koutsos and Dimitrios Papadopoulos |
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood and Mohamed Ali Kaafar |
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages Sara Bardi, Mauro Conti, Luca Pajola and Pier Paolo Tricomi |
Private Information Retrieval with Result Verification for More Servers Pengzhen Ke and Liang Feng Zhang |
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems Nick Frymann, Daniel Gardham, Mark Manulis and Hugo Nartz |
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning Hongbin Chen, Chaohao Fu and Na Ruan |
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha and Mostafizar Rahman |
POSTER: Ransomware detection mechanism – project status at the beginning of 2023 Michał Glet and Kamil Kaczyński |
POSTER: AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets Joon Kuy Han |
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT Hung-Yu Chien |
POSTER: Stopping Run-time Countermeasures in Cryptographic Primitives Myung-Hyun Kim, Taek-Young Youn, and Seungkwang Lee |
POSTER: Swarm-based IoT Network Penetration Testing by IoT Devices Thomas Schiller and Sean Mondesire |
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance Chunlu Chen, Kevin I-Kai Wang, Peng Li, and Kouichi Sakurai |
POSTER:A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses Haibo Zhang, Zhihua Yao, and Kouichi Sakurai |
POSTER: Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks Juris Viksna, Sergejs Kozlovics, and Edgars Rencis |
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems Muhammad Nouman Nafees, Neetesh Saxena, and Pete Burnap |
POSTER: PriAuct: Privacy Preserving Auction Mechanism Neha Joshi, Abhishek Thakur, and A Antony Franklin |
POSTER: Using Verifiable Credentials for authentication of UAVs in logistics Ken Watanabe1 and Kazue Sako |
POSTER: A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale Yuji Suga |
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, and Weizheng Wang |
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, and Mingsheng Wang |
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing Tianyu Zhang |
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak Mohammad Vaziri and Vesselin Velichkov |
Smart Contract-based E-Voting System Using Homomorphic Encryption and Zero-knowledge Proof Yuxiao Wu and Shoji Kasahara |
Preventing Content Cloning in NFT Collections Ivan Visconti, Andrea Vitaletti, and Marco Zecchini |
NFT Trades in Bitcoin with Off-chain Receipts Mehmet Sabir Kiraz, Enrique Larraia, and Owen Vaughan |
A Comparison of Multi-task learning and Single-task learning Approaches Thomas Marquet and Elisabeth Oswald |
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs Thomas Schamberger, Maximilian Egger, and Lars Tebelmann |
Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber Linus Backlund, Kalle Ngo, Joel G¨artner, and Elena Dubrova |
SoK: Assisted Fault Simulation Existing Challenges and Opportunities Offered by AI Asmita Adhikary and Ileana Buhan |
Using Model Optimization as Countermeasure against Model Recovery Attacks Dirmanto Jap and Shivam Bhasin |
Blockchain-enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks Ali Hussain Khan, Naveed UL Hassan, Chuadhry Mujeeb Ahmed, Zartash Afzal Uzmi, and Chau Yuen |
A Security Policy Engine for Building Energy Management Systems Jiahui Lim, Wenshei Ong, Utku Tefek, and Ertem Esiner |
EARIC: Exploiting ADC Registers in IoT and Control Systems Eyasu Getahun Chekole, Rajaram Thulasiraman, and Jianying Zhou |
Round-Efficient Security Authentication Protocol For 5G Network Guining Geng, Junfeng Miao, and Nan Xiao |
A Framework for TLS Implementation Vulnerability Testing in 5G Yong Wang, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang, Lei Ma, Fangzhe Zhang, Lili Sun, and Zhenghao Li |
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems Sim Siang Tze Victor, Chuadhry Mujeeb Ahmed, Koh Yoong Keat Kelvin, and Zhou Jianying |
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems Mahender Kumar, Gregory Epiphaniou, and Carsten Maple |
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, and Robin Doss |
slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference Francesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan-Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux |
Trust Management Framework for Containerized Workloads – Applications to 5G Networks Aicha Miloudi, Luis Suárez, Nora Boulahia Cuppens, Frédéric Cuppens, and Stere Preda |
cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption Wenyuan Li, Wei Wang, Fan Lang, Linli Lu, and Heqing Huang |
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers Tongxia Deng, Ping Li1, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, and Yiyuan Luo |
Efficient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform Feng Yang, Hui Cui, and Jiwu Jing |
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation Aicha Miloudi, Luis Suárez, Nora Boulahia Cuppens, Frédéric Cuppens, and Stere Preda |
Hybrid Post-Quantum Signatures in Hardware Security Keys Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kolbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein |
Multi-Armed SPHINCS+ Gustavo Banegas and Florian Caullery |
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions Sazzadur Rahaman, Miles Frantz, Barton Miller, and Danfeng (Daphne) Yao |
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret Teik Guan Tan, Vishal Sharma, Zeng Peng Li, Pawel Szalachowski, and Jianying Zhou |
If you’re scanning this, it’s too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps Federico Carboni, Mauro Conti, Denis Donadel, and Mariano Sciacco |
Enabling Lightweight Privilege Separation in Applications with MicroGuards Zahra Tarkhani and Anil Madhavapeddy |
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method Haibo Zhang, Zhihua Yao, and Kouichi Sakurai |
Federated Learning Approach for Distributed Ransomware Analysis Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, and Jorge Crichigno |
Forensic Identication of Android Trojans Using Stacked Ensemble of Deep Neural Networks Mohammed M. Alani, Atefeh Mashatan, and Ali Miri |