Search
Search Results
-
Optimally-Fair Multi-party Exchange Without Trusted Parties
We present a multi-party exchange protocol that achieves optimal partial fairness even in the presence of a dishonest majority. We demonstrate how... -
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite... -
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a... -
Scaling Mobile Private Contact Discovery to Billions of Users
Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing... -
Code-Based Secret Handshake Scheme, Revisited
Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of... -
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on... -
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a... -
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Attribute-Based Encryption (ABE) is a very attractive primitive to limit access according to specific rights. While very powerful instantiations have... -
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves
Pairings on genus 2 hyperelliptic curves are believed to be far less efficient compared to elliptic curve ones. The main reason is the structure of... -
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
The unprotected implementations of Kyber and Dilithium have recently been shown to offer a variety of side-channel attack paths. These attacks have... -
On the Generalizations of the Rank Metric over Finite Chain Rings
The rank metric over finite fields has received a lot of attention these last decades. Several works propose generalizations of this metric to finite... -
Introduction to Usable Privacy
This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and... -
Overview of Usable Privacy Research: Major Themes and Research Directions
A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy... -
Challenges of Usable Privacy
A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding... -
Trust Assumptions in Voting Systems
Assessing and comparing the security level of different voting systems is non-trivial as the technical means provided for and societal assumptions... -
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI
Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps... -
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
Shellcode is a critical element in computer security that exploits vulnerabilities within software systems. Shellcode is written in machine code and... -
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework
Machine Learning as a Service (MLaaS) is a robust platform that offers various emerging applications. Despite great convenience, user privacy has... -
The VOCODES Kill Chain for Voice Controllable Devices
In this paper, we introduce a formalisation of attacks on Voice Controllable Devices (VCDs), focusing specifically on attacks leveraging the voice... -
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT
A typical analyst spends much time and effort investigating alerts from network intrusion detection systems (NIDS). Available NIDS rules for...