ACNS 2023

21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
19-22 June, 2023

Accepted Papers

Regular Papers

Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities
Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao and Xintian Hou
Formal Verification of Arithmetic Masking in Hardware and Software
Barbara Gigerl, Robert Primas and Stefan Mangard
Robustly Reusable Fuzzy Extractors in a Post-Quantum World
Amit Deo and Charles Grover
Pairings in Rank-1 Constraint System
Youssef El Housni
Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning
Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo and Sin G. Teo
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang and Xiangyong Zeng
Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS
Keitaro Hiwatashi and Koji Nuida
Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis
Cong Tian, Dengpan Ye and Chuanxi Chen
Forward Security of Fiat-Shamir Lattice Signatures
Yang Tao, Rui Zhang and Yunfeng Ji
Meet-in-the-Filter and Dynamic Counting with Applications to Speck
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko and Vesselin Velichkov
Near Collision Attack against Grain v1
Subhadeep Banik, Daniel Collins and Willi Meier
Layered Binary Templating
Martin Schwarzl, Erik Kraft and Daniel Gruss
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers
Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim and Hsu-Chun Hsiao
Subversion-Resilient Authenticated Encryption without Random Oracles
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager and Thomas Eisenbarth
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo, Bernardo David, Omer Shlomovits and Denis Varlakov
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption
Luke Harmon, Gaetan Delavignette, Arnab Roy and David Silva
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform
Daniele Friolo, Matteo Salvino and Daniele Venturi
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi and Yu Xia
A Forkcipher-based Pseudo-Random Number Generator
Elena Andreeva and Andreas Weninger
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access
Sebastian Surminski, Christian Niesler, Lucas Davi and Ahmad-Reza Sadeghi
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era
Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty and Sebastian Faust
TIDAL: Practical Collisions on State-Reduced Keccak Variants
Sahiba Suryawanshi, Dhiman Saha and Shashwat Jaiswal
Recommendation for a holistic secure embedded ISA extension
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich and Tim Güneysu