


default search action
21st ACNS 2023: Kyoto, Japan - Part I
- Mehdi Tibouchi

, Xiaofeng Wang
:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer 2023, ISBN 978-3-031-33487-0
Side-Channel and Fault Attacks
- Barbara Gigerl, Robert Primas, Stefan Mangard

:
Formal Verification of Arithmetic Masking in Hardware and Software. 3-32 - Martin Schwarzl, Erik Kraft, Daniel Gruss

:
Layered Binary Templating. 33-58 - Kenta Tani, Noboru Kunihiro

:
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences. 59-88 - Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:

Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. 89-116
Symmetric Cryptanalysis
- Yong Liu

, Zejun Xiang
, Siwei Chen, Shasha Zhang
, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. 119-148 - Alex Biryukov

, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko
, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. 149-177 - Subhadeep Banik, Daniel Collins, Willi Meier:

Near Collision Attack Against Grain V1. 178-207 - Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal:

TIDAL: Practical Collisions on State-Reduced Keccak Variants. 208-233
Web Security
- Cong Tian

, Dengpan Ye
, Chuanxi Chen
:
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis. 237-259 - Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:

Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers. 260-283 - Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar

, Ian D. Wood
, Mohamed Ali Kâafar
:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. 284-308 - Sara Bardi, Mauro Conti

, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. 309-336
Elliptic Curves and Pairings
- Youssef El Housni

:
Pairings in Rank-1 Constraint Systems. 339-362 - Sabyasachi Karati:

Binary Kummer Line. 363-393 - Nick Frymann, Daniel Gardham, Mark Manulis

, Hugo Nartz
:
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems. 394-421
Homomorphic Cryptography
- Luke Harmon

, Gaetan Delavignette
, Arnab Roy
, David William Honorio Araujo da Silva
:
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption. 425-450 - Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra-Arnau, Thorsten Strufe:

Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols. 451-475 - Yunlong Mao

, Ziqin Dang
, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong:
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch. 476-500
Machine Learning
- Mao V. Ngo, Tram Truong Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo:

Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning. 503-531 - Hamdi Friji, Alexis Olivereau, Mireille Sarkiss

:
Efficient Network Representation for GNN-Based Intrusion Detection. 532-554 - Qisheng Zhang

, Jin-Hee Cho
, Terrence J. Moore
, Dan Dongseong Kim
, Hyuk Lim
, Frederica Nelson
:
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. 555-582 - Hongbin Chen, Chaohao Fu, Na Ruan:

Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning. 583-604
Lattices and Codes
- Yang Tao, Rui Zhang, Yunfeng Ji:

Forward Security of Fiat-Shamir Lattice Signatures. 607-633 - Éric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier:

Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices. 634-663 - Bénédikt Tran

, Serge Vaudenay:
A Gapless Post-quantum Hash Proof System in the Hamming Metric. 664-694 - Hiroki Okada

, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. 695-724 - Agathe Cheriere, Nicolas Aragon, Tania Richmond

, Benoît Gérard:
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding. 725-748

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














