


default search action
27th ISC 2024: Arlington, VA, USA - Part I
- Nicky Mouha

, Nick Nikiforakis
:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15257, Springer 2025, ISBN 978-3-031-75756-3
Blockchain
- Kundu Chen, Jie Luo, Yi Lu, Zhongyun Zhang, Wenbo Zhang, Xudong Wang, Pan Li, Jun Zhao:

The Formal Verification of Aptos Coin. 3-22 - Ghada Almashaqbeh, Anca Nitulescu:

Anonymous, Timed and Revocable Proxy Signatures. 23-43
Symmetric-Key Cryptography
- Yong Liu

, Zejun Xiang
, Shasha Zhang
, Xiangyong Zeng
:
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128. 47-66 - Xiangyang Zhang

, Yaobin Shen
, Lei Wang
:
Security Analysis of CMAC in the Multi-user Model. 67-86 - Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba:

Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys. 87-103
Machine Learning
- Jiacheng Xu

, Jianpeng Hu, Chunqing Yu, Chengxiang Tan:
Optimizing Label-Only Membership Inference Attacks by Global Relative Decision Boundary Distances. 107-126 - Kejun Zhang, Yutuo Song

, Shaofei Xu, Pengcheng Li, Rong Qian, Pengzhi Han, Lingyun Xu:
Risk of Text Backdoor Attacks Under Dataset Distillation. 127-144
Mobile Security and Trusted Execution
- Alex Le Blanc, Ivan Pustogarov:

Emulating Android Device Drivers via Borrowed Execution Context. 147-167
Software Security
- Chengxiang Liao, Ruipeng Wang, Yuwei Li, Juxing Chen, Yang Li, Zulie Pan:

SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling. 171-189 - Jingzi Meng, Yuewu Wang, Lingguang Lei, Chunjing Kou, Peng Wang:

A Lightweight Defense Scheme Against Usermode Helper Privilege Escalation Using Linux Capability. 190-208
Multi-Party Computation
- Shohei Kaneko

, Pascal Lafourcade
, Lola-Baie Mallordy
, Daiki Miyahara
, Maxime Puys
, Kazuo Sakiyama
:
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles. 211-231 - Ahmed Zawia, M. Anwar Hasan:

ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination. 232-251 - Yan Xu, Guizhen Zhu, Huaxiong Wang, Li-Ping Wang:

Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding. 252-272 - Charles Gouert

, Mehmet Ugurbil
, Dimitris Mouris
, Miguel de Vega, Nektarios Georgios Tsoutsos
:
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations. 273-293 - Antoine Urban

, Matthieu Rambaud
:
Robust Multiparty Computation from Threshold Encryption Based on RLWE. 294-314 - Ying Liu

, Zhihao Li
, Ruida Wang
, Xianhui Lu
, Kunpeng Wang
:
Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT. 315-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














