


default search action
36th CSF 2023: Dubrovnik, Croatia
- 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023. IEEE 2023, ISBN 979-8-3503-2192-0

- Denis Firsov, Dominique Unruh:

Zero-Knowledge in EasyCrypt. 1-16 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:

Statement-Oblivious Threshold Witness Encryption. 17-32 - Zahra Javar, Bruce M. Kapron:

Preimage Awareness in Linicrypt. 33-42 - Vincent Cheval

, Véronique Cortier, Alexandre Debant:
Election Verifiability with ProVerif. 43-58 - Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:

Election Verifiability in Receipt-Free Voting Protocols. 59-74 - David Baelde, Alexandre Debant, Stéphanie Delaune:

Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes. 75-90 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:

Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults. 91-106 - Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei:

Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. 107-122 - Yunxiao Zhang

, Pasquale Malacaria:
Keep Spending: Beyond Optimal Cyber-Security Investment. 123-136 - Chris Brzuska, Sabine Oechsner

:
A State-Separating Proof for Yao's Garbling Scheme. 137-152 - Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia:

On the Incoercibility of Digital Signatures. 153-168 - Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia:

SoK: Delay-Based Cryptography. 169-183 - Vincent Cheval

, Itsaka Rakotonirina:
Indistinguishability Beyond Diff-Equivalence in ProVerif. 184-199 - Cas Cremers, Charlie Jacomme, Philip Lukert:

Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis. 200-213 - Johannes Wilson

, Mikael Asplund
, Niklas Johansson:
Extending the Authentication Hierarchy with One-Way Agreement. 214-228 - Aikaterini-Panagiota Stouka, Thomas Zacharias

:
On the (De) centralization of FruitChains. 229-244 - Sebastian Holler, Sebastian Biewer, Clara Schneidewind:

HoRStify: Sound Security Analysis of Smart Contracts. 245-260 - Eric Chan, Marek Chrobak, Mohsen Lesani:

Cross-Chain Swaps with Preferences. 261-275 - Norine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia J. Tillman:

Smart Contract Synthesis Modulo Hyperproperties. 276-291 - Jeppe Fredsgaard Blaabjerg, Aslan Askarov:

OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads. 292-307 - Marco Patrignani

, Sam Blackshear:
Robust Safety for Move. 308-323 - Farzaneh Derakhshan

, Zichao Zhang, Amit Vasudevan, Limin Jia
:
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers. 324-339 - Rodothea-Myrsini Tsoupidi

, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos
:
Securing Optimized Code Against Power Side Channels. 340-355 - Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach:

Formalizing Stack Safety as a Security Property. 356-371 - Matthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu:

A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity. 372-387 - Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso:

Bayes Security: A Not So Average Metric. 388-406 - Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information. 407-422 - Mireya Jurado, Ramon G. Gonze, Mário S. Alvim, Catuscia Palamidessi:

Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow. 423-438 - Sayanton V. Dibbo:

SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap. 439-456 - Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa:

From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies. 457-472 - Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:

Investigating Membership Inference Attacks under Data Dependencies. 473-488 - Adi Akavia, Ben Galili

, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE. 489-504 - Andrew C. Reed, Michael K. Reiter:

Optimally Hiding Object Sizes with Constrained Padding. 505-520 - Bernardo Portela

, Hugo Pacheco
, Pedro Jorge
, Rogério Pontes
:
General-Purpose Secure Conflict-free Replicated Data Types. 521-536 - Emiel Lanckriet

, Matteo Busi
, Dominique Devriese
:
$\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote Attestation. 537-551 - Benjamin Salling Hvass, Diego F. Aranha

, Bas Spitters
:
High-Assurance Field Inversion for Curve-Based Cryptography. 552-567 - Sherman S. M. Chow

, Christoph Egger
, Russell W. F. Lai
, Viktoria Ronge, Ivy K. Y. Woo
:
On Sustainable Ring-Based Anonymous Systems. 568-583 - Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate:

Collusion-Deterrent Threshold Information Escrow. 584-599

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














