


default search action
23rd ACNS 2025: Munich, Germany - Part II
- Marc Fischlin

, Veelasha Moonsamy
:
Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15826, Springer 2025, ISBN 978-3-031-95763-5
Side Channels
- Jonas Juffinger

, Sudheendra Raghav Neela
, Daniel Gruss
:
Not So Secure TSC. 3-23 - Britney Bourassa, Yan Michalevsky, Saba Eskandarian:

G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels. 24-48 - Vojtech Suchanek, Vladimir Sedlacek, Marek Sýs:

Decompose and Conquer: ZVP Attacks on GLV Curves. 49-73 - Yan Li, Zhenrui Zhang, Zhiyu Lang, Xiang Li, Jia Zhang, Donghong Sun:

Wolf in Sheep's Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO. 74-103
Information Security
- Jean-Guillaume Dumas

, Alexis Galan, Bruno Grenet, Aude Maignan, Daniel S. Roche:
Optimal Communication Unbalanced Private Set Union. 107-135 - Keitaro Hiwatashi:

Negative Results on Information-Theoretic Additive Randomized Encodings. 136-157 - Antonín Dufka, Peeter Laud, Petr Svenda:

Two-Party ECDSA with JavaCard-Based Smartcards. 158-175 - Huifeng Li, Qianmu Li, Yingquan Chen, Qing Chang, Xiaocong Wu:

MSED: A Linguistic Steganalysis Method Based on Multi-granularity Semantic Extraction Using Dual-Mode Fusion. 176-192
Privacy and Anonymity
- Hongyuan Cai

, Xiaodong Wang, Zijie Lu
, Bei Liang
:
Privately Compute the Item with Maximal Weight Sum in Set Intersection. 195-223 - Javier Gomez-Martinez, Dimitrios Vasilopoulos

, Pedro Moreno-Sanchez
, Dario Fiore
:
Algebraic Zero Knowledge Contingent Payment. 224-254 - Benoît Libert, Thomas Peters:

On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme. 255-282 - George Papadoulis

, Danai Balla
, Panagiotis Grontas
, Aris Pagourtzis
:
AQQUA: Augmenting Quisquis with Auditability. 283-312
Cryptanalysis
- Felix Dörre

, Astrid Ottenhues
:
Security Analysis of Forward Secure Log Sealing in Journald. 315-341 - Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu:

Generic Security of GCM-SST. 342-369 - Marc Damie

, Jean-Benoist Leger
, Florian Hahn
, Andreas Peter
:
Revisiting the Attacker's Knowledge in Inference Attacks Against Searchable Symmetric Encryption. 370-399 - Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:

On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers. 400-425
Attacks and Vulnerabilities
- Denis Donadel

, Kavya Balasubramanian
, Alessandro Brighente
, Bhaskar Ramasubramanian, Mauro Conti
, Radha Poovendran
:
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations. 429-458 - Felix Mächtle, Jan-Niclas Serr, Nils Loose, Jonas Sander, Thomas Eisenbarth:

OCEAN: Open-World Contrastive Authorship Identification. 459-486 - Giacomo Benedetti

, Serena Cofano
, Alessandro Brighente
, Mauro Conti
:
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach. 487-509 - Paula Arnold

, Sebastian Berndt
, Jörn Müller-Quade, Astrid Ottenhues
:
Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework. 510-539

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














