Title: | Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols |
Authors: | Ronghai Yang, Wing Cheong Lau and Shangcheng Shi |
|
Title: | Signature Schemes with Randomized Verification |
Authors: | Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran and Brent Waters |
|
Title: | Side-Channel Attacks meet Secure Network Protocols |
Authors: | Alex Biryukov, Daniel Dinu and Yann Le Corre |
|
Title: | Almost Optimal Oblivious Transfer from QA-NIZK |
Authors: | Olivier Blazy, Céline Chevalier and Paul Germouty |
|
Title: | Efficiently Obfuscating Re-Encryption Program under DDH Assumption |
Authors: | Akshayaram Srinivasan and Chandrasekaran Pandu Rangan |
|
Title: | Multi-Client Oblivious RAM Secure Against Malicious Servers |
Authors: | Erik-Oliver Blass, Travis Mayberry and Guevara Noubir |
|
Title: | Related-Key Impossible-Differential Attack on Reduced-Round SKINNY |
Authors: | Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim and Gaoli Wang |
|
Title: | An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis |
Authors: | Sze Ling Yeo, Zhen Li, Khoongming Khoo and Yu Bin Low |
|
Title: | A Pilot Study of Multiple Password Interference between Text and Map-based Passwords |
Authors: | Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou |
|
Title: | Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes |
Authors: | Dan Boneh, Sam Kim and Valeria Nikolaenko |
|
Title: | More Efficient Construction of Bounded KDM Secure Encryption |
Authors: | Kaoru Kurosawa and Rie Habuka |
|
Title: | Simple Security Definitions for and Constructions of 0-RTT Key Exchange |
Authors: | Britta Hale, Tibor Jager, Sebastian Lauer and Jorg Schwenk |
|
Title: | Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) |
Authors: | David Bernhard, Ngoc Khanh Nguyen and Bogdan Warinschi |
|
Title: | OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks |
Authors: | Daniel Demmler, Marco Holz and Thomas Schneider |
|
Title: | A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium |
Authors: | Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi and Marco Pedicini |
|
Title: | Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks |
Authors: | Bruce Berg, Tyler Kaczmarek, Alfred Kobsa and Gene Tsudik |
|
Title: | cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operations |
Authors: | David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De Ruiter and Alan T. Sherman |
|
Title: | Are You Lying: Validating the Time-Location of Outdoor Images |
Authors: | Xiaopeng Li, Wenyuan Xu, Song Wang and Xianshan Qu |
|
Title: | An experimental study of the BDD approach for the search LWE problem |
Authors: | Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto and Henricksen Matt |
|
Title: | TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF |
Authors: | Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu |
|
Title: | Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease |
Authors: | San Ling, Khoa Nguyen, Huaxiong Wang and Yanhong Xu |
|
Title: | A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers |
Authors: | Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao and Yuan Ma |
|
Title: | Secure and Efficient Pairing at 256-bit Security Level |
Authors: | Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi and Tetsutaro Kobayashi |
|
Title: | No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices |
Authors: | Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran |
|
Title: | Legacy-Compliant Data Authentication for Industrial Control System Traffic |
Authors: | John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Mart?n Ochoa |
|
Title: | Bounds in Various Generalized Settings of the Discrete Logarithm Problem |
Authors: | Jason Ying and Noboru Kunihiro |
|
Title: | Trade-offs for S-boxes: Cryptographic Properties and Side-channel Resilience |
Authors: | Claude Carlet, Annelie Heuser and Stjepan Picek |
|
Title: | Forward-Secure Searchable Encryption on Labeled Bipartite Graphs |
Authors: | Russell W. F. Lai and Sherman S. M. Chow |
|
Title: | SCRAPE: Scalable Randomness Attested by Public Entities |
Authors: | Ignacio Cascudo and Bernardo M. David |
|
Title: | Maliciously Secure Multi-Client ORAM |
Authors: | Matteo Maffei, Giulio Malavolta, Manuel Reinert and Dominique Schroeder |
|
Title: | Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography |
Authors: | Carlos Aguilar-Melchor, Martin Albrecht and Thomas Ricosset |
|
Title: | Legacy-Compliant Data Authentication for Industrial Control System Traffic |
Authors: | Yi-Ruei Chen and Wen-Guey Tzeng |
|
Title: | Accountable Storage |
Authors: | Giuseppe Ateniese, Michael Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas and Roberto Tamassia |
|
Title: | Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables |
Authors: | Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez and Srinivas Vivek |