


default search action
34th CSF 2021: Dubrovnik, Croatia
- 34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021. IEEE 2021, ISBN 978-1-7281-7607-9

- Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:

Yes We can: Watermarking Machine Learning Models beyond Classification. 1-14 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Simone Tini:

Formal Impact Metrics for Cyber-physical Attacks. 1-16 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss

:
KACHINA - Foundations of Private Smart Contracts. 1-16 - François Dupressoir, Sara Zain

:
Machine-Checking Unforgeability Proofs for Signature Schemes with Tight Reductions to the Computational Diffie-Hellman Problem. 1-15 - Akram El-Korashy, Stelios Tsampas

, Marco Patrignani
, Dominique Devriese
, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. 1-16 - Massimo Bartoletti, Stefano Lande, Roberto Zunino

:
Computationally sound Bitcoin tokens. 1-15 - Yu Wang

, Siddhartha Nalluri, Borzoo Bonakdarpour, Miroslav Pajic:
Statistical Model Checking for Hyperproperties. 1-16 - Ioanna Karantaidou, Foteini Baldimtsi:

Efficient Constructions of Pairing Based Accumulators. 1-16 - Carlos E. Budde

, Mariëlle Stoelinga
:
Efficient Algorithms for Quantitative Attack Tree Analysis. 1-15 - Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss

, Hendrik Waldner:
Consistency for Functional Encryption. 1-16 - Leslie Lamport, Fred B. Schneider:

Verifying Hyperproperties With TLA. 1-16 - Chike Abuah, Alex Silence, David Darais, Joseph P. Near:

DDUO: General-Purpose Dynamic Analysis for Differential Privacy. 1-15 - Nikolaj Sidorenco, Sabine Oechsner

, Bas Spitters
:
Formal security analysis of MPC-in-the-head zero-knowledge protocols. 1-14 - Sebastian Hunt

, David Sands:
A Quantale of Information. 1-15 - Lucca Hirschi, Lara Schmid, David A. Basin:

Fixing the Achilles Heel of E-Voting: The Bulletin Board. 1-17 - David A. Basin, Andreas Lochbihler, Ueli Maurer, S. Reza Sefidgar:

Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL. 1-16 - Ioana Boureanu

, Constantin Catalin Dragan
, François Dupressoir, David Gérault, Pascal Lafourcade:
Mechanised Models and Proofs for Distance-Bounding. 1-16 - Arthur Américo, Pasquale Malacaria:

Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures. 1-14 - Jeppe Fredsgaard Blaabjerg, Aslan Askarov:

Towards Language-Based Mitigation of Traffic Analysis Attacks. 1-15 - Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:

Heuristic Approach for Countermeasure Selection Using Attack Graphs. 1-16 - Andreas V. Hess, Sebastian Mödersheim

, Achim D. Brucker, Anders Schlichtkrull
:
Performing Security Proofs of Stateful Protocols. 1-16 - Kirsten Winter, Nicholas Coughlin

, Graeme Smith
:
Backwards-directed information flow analysis for concurrent programs. 1-16 - Christoph Baumann, Mads Dam, Roberto Guanciale, Hamed Nemati

:
On Compositional Information Flow Aware Refinement. 1-16 - Abhishek Bichhawat, McKenna McCall

, Limin Jia
:
Gradual Security Types and Gradual Guarantees. 1-16 - Jian Xiang, Nathan Fulton, Stephen Chong:

Relational Analysis of Sensor Attacks on Cyber-Physical Systems. 1-16 - Robert Künnemann, Deepak Garg, Michael Backes:

Accountability in the Decentralised-Adversary Setting. 1-16 - Denis Firsov, Henri Lakk, Ahto Truu:

Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping. 1-13 - Ankush Das

, Stephanie Balzer, Jan Hoffmann, Frank Pfenning, Ishani Santurkar:
Resource-Aware Session Types for Digital Contracts. 1-16 - Sébastien Gondron, Sebastian Mödersheim

:
Vertical Composition and Sound Payload Abstraction for Stateful Protocols. 1-16 - Aditya Oak, Amir M. Ahmadian

, Musard Balliu, Guido Salvaneschi
:
Language Support for Secure Software Development with Enclaves. 1-16 - Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk:

A Coq proof of the correctness of X25519 in TweetNaCl. 1-16 - Alexander Dax, Robert Künnemann:

On the Soundness of Infrastructure Adversaries. 1-16 - Abhishek Bichhawat, Matt Fredrikson

, Jean Yang:
Automating Audit with Policy Inference. 1-16 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:

Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases. 1-16 - Kevin Morio

, Robert Künnemann:
Verifying Accountability for Unbounded Sets of Participants. 1-16 - Mireya Jurado

, Catuscia Palamidessi, Geoffrey Smith:
A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption. 1-16 - Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, Hideaki Sone:

Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags. 1-16 - Sevdenur Baloglu

, Sergiu Bursuc
, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. 1-15 - Søren Eller Thomsen

, Bas Spitters
:
Formalizing Nakamoto-Style Proof of Stake. 1-15 - Carmine Abate, Philipp G. Haselwarter

, Exequiel Rivas
, Antoine Van Muylder
, Théo Winterhalter, Catalin Hritcu, Kenji Maillard, Bas Spitters
:
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. 1-15 - Maximilian Algehed, Jean-Philippe Bernardy, Catalin Hritcu:

Dynamic IFC Theorems for Free! 1-14 - Tobias Klenze, Christoph Sprenger

, David A. Basin:
Formal Verification of Secure Forwarding Protocols. 1-16 - Gilles Barthe, Sandrine Blazy

, Rémi Hutin, David Pichardie:
Secure Compilation of Constant-Resource Programs. 1-12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














