We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations

    Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite...
    Carmen Wabartha, Julian Liedtke, ... Ralf Küsters in Computer Security – ESORICS 2023
    Conference paper 2024
  2. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

    Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a...
    Aysajan Abidin, Erik Pohle, Bart Preneel in Computer Security – ESORICS 2023
    Conference paper 2024
  3. Scaling Mobile Private Contact Discovery to Billions of Users

    Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing...
    Laura Hetz, Thomas Schneider, Christian Weinert in Computer Security – ESORICS 2023
    Conference paper 2024
  4. Code-Based Secret Handshake Scheme, Revisited

    Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of...
    Minkyu Kim, Hyung Tae Lee in Computer Security – ESORICS 2023
    Conference paper 2024
  5. Cheap and Fast Iterative Matrix Inverse in Encrypted Domain

    Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on...
    Tae Min Ahn, Kang Hoon Lee, ... Ji Won Yoon in Computer Security – ESORICS 2023
    Conference paper 2024
  6. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

    Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a...
    Zhiyuan An, Haibo Tian, ... Fangguo Zhang in Computer Security – ESORICS 2023
    Conference paper 2024
  7. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE

    Attribute-Based Encryption (ABE) is a very attractive primitive to limit access according to specific rights. While very powerful instantiations have...
    Théophile Brézot, Paola de Perthuis, David Pointcheval in Computer Security – ESORICS 2023
    Conference paper 2024
  8. A Graph Transformation-Based Engine for the Automated Exploration of Constraint Models

    In this demonstration, we present an engine leveraging graph transformations for the automated reformulation of constraint specifications of...
    Christopher Stone, András Z. Salamon, Ian Miguel in Graph Transformation
    Conference paper 2024
  9. Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves

    Pairings on genus 2 hyperelliptic curves are believed to be far less efficient compared to elliptic curve ones. The main reason is the structure of...
    Mónica P. Arenas, Georgios Fotiadis, Elisavet Konstantinou in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  10. Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber

    The unprotected implementations of Kyber and Dilithium have recently been shown to offer a variety of side-channel attack paths. These attacks have...
    Duyên Pay, François-Xavier Standaert in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  11. On the Generalizations of the Rank Metric over Finite Chain Rings

    The rank metric over finite fields has received a lot of attention these last decades. Several works propose generalizations of this metric to finite...
    Hermann Tchatchiem Kamche, Hervé Talé Kalachi in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  12. Generalized Weighted Type Graphs for Termination of Graph Transformation Systems

    We refine the weighted type graph technique for proving termination of double pushout (DPO) graph transformation systems. We increase the power of...
    Jörg Endrullis, Roy Overbeek in Graph Transformation
    Conference paper 2024
  13. Trust Assumptions in Voting Systems

    Assessing and comparing the security level of different voting systems is non-trivial as the technical means provided for and societal assumptions...
    Kristjan Krips, Nikita Snetkov, ... Jan Willemson in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  14. FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI

    Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps...
    Janaka Senanayake, Harsha Kalutarage, ... Luca Piras in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  15. Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86

    Shellcode is a critical element in computer security that exploits vulnerabilities within software systems. Shellcode is written in machine code and...
    Conference paper 2024
  16. An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework

    Machine Learning as a Service (MLaaS) is a robust platform that offers various emerging applications. Despite great convenience, user privacy has...
    Tzu-Li Liu, Yu-Te Ku, ... Shih-Hao Hung in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  17. The VOCODES Kill Chain for Voice Controllable Devices

    In this paper, we introduce a formalisation of attacks on Voice Controllable Devices (VCDs), focusing specifically on attacks leveraging the voice...
    Sergio Esposito, Daniele Sgandurra, Giampaolo Bella in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  18. Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT

    A typical analyst spends much time and effort investigating alerts from network intrusion detection systems (NIDS). Available NIDS rules for...
    Nir Daniel, Florian Klaus Kaiser, ... Rami Puzis in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  19. iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption

    Attribute-Based Encryption ( \(\textsf {ABE}\) )...
    Pascal Lafourcade, Gael Marcadet, Léo Robert in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  20. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
Did you find what you were looking for? Share feedback.