21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
| 19-22 June, 2023
Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao and Xintian Hou |
Formal Verification of Arithmetic Masking in Hardware and Software Barbara Gigerl, Robert Primas and Stefan Mangard |
Robustly Reusable Fuzzy Extractors in a Post-Quantum World Amit Deo and Charles Grover |
Pairings in Rank-1 Constraint System Youssef El Housni |
Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo and Sin G. Teo |
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang and Xiangyong Zeng |
Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS Keitaro Hiwatashi and Koji Nuida |
Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis Cong Tian, Dengpan Ye and Chuanxi Chen |
Forward Security of Fiat-Shamir Lattice Signatures Yang Tao, Rui Zhang and Yunfeng Ji |
Meet-in-the-Filter and Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko and Vesselin Velichkov |
Near Collision Attack against Grain v1 Subhadeep Banik, Daniel Collins and Willi Meier |
Layered Binary Templating Martin Schwarzl, Erik Kraft and Daniel Gruss |
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim and Hsu-Chun Hsiao |
Subversion-Resilient Authenticated Encryption without Random Oracles Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager and Thomas Eisenbarth |
Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits and Denis Varlakov |
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Luke Harmon, Gaetan Delavignette, Arnab Roy and David Silva |
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino and Daniele Venturi |
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions Michele Ciampi and Yu Xia |
A Forkcipher-based Pseudo-Random Number Generator Elena Andreeva and Andreas Weninger |
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access Sebastian Surminski, Christian Niesler, Lucas Davi and Ahmad-Reza Sadeghi |
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty and Sebastian Faust |
TIDAL: Practical Collisions on State-Reduced Keccak Variants Sahiba Suryawanshi, Dhiman Saha and Shashwat Jaiswal |
Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich and Tim Güneysu |