Search
Search Results
-
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite... -
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a... -
Scaling Mobile Private Contact Discovery to Billions of Users
Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing... -
Code-Based Secret Handshake Scheme, Revisited
Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of... -
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on... -
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a... -
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Attribute-Based Encryption (ABE) is a very attractive primitive to limit access according to specific rights. While very powerful instantiations have... -
A Graph Transformation-Based Engine for the Automated Exploration of Constraint Models
In this demonstration, we present an engine leveraging graph transformations for the automated reformulation of constraint specifications of... -
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves
Pairings on genus 2 hyperelliptic curves are believed to be far less efficient compared to elliptic curve ones. The main reason is the structure of... -
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
The unprotected implementations of Kyber and Dilithium have recently been shown to offer a variety of side-channel attack paths. These attacks have... -
On the Generalizations of the Rank Metric over Finite Chain Rings
The rank metric over finite fields has received a lot of attention these last decades. Several works propose generalizations of this metric to finite... -
Generalized Weighted Type Graphs for Termination of Graph Transformation Systems
We refine the weighted type graph technique for proving termination of double pushout (DPO) graph transformation systems. We increase the power of... -
Trust Assumptions in Voting Systems
Assessing and comparing the security level of different voting systems is non-trivial as the technical means provided for and societal assumptions... -
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI
Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps... -
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
Shellcode is a critical element in computer security that exploits vulnerabilities within software systems. Shellcode is written in machine code and... -
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework
Machine Learning as a Service (MLaaS) is a robust platform that offers various emerging applications. Despite great convenience, user privacy has... -
The VOCODES Kill Chain for Voice Controllable Devices
In this paper, we introduce a formalisation of attacks on Voice Controllable Devices (VCDs), focusing specifically on attacks leveraging the voice... -
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT
A typical analyst spends much time and effort investigating alerts from network intrusion detection systems (NIDS). Available NIDS rules for... -
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption
Attribute-Based Encryption ( \(\textsf {ABE}\) )... -
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...