Accepted Papers

Paper ID Authors Paper Title
10 Hiroki Okada, Shinsaku Kiyomoto, and Carlos Cid Integerwise Functional Bootstrapping on TFHE
12 Masahito Ishizaka and Shinsaku Kiyomoto Time-Specific Signatures
19 Ryoma Ito Rotational Cryptanalysis of Salsa Core Function
20 Kai Chih Chang, Razieh Nokhbeh Zaeem and K. Suzanne Barber A Framework for Estimating Privacy Risk Scores of Mobile Apps
23 Youle Xu and Qichun Wang Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance
26 Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun and Jingzi Meng Evaluation on the Security of Commercial Cloud Container Services
28 Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong and Jinwen Zheng Anonymous IBE From Quadratic Residuosity With Fast Encryption
30 Ge Cheng, Hui Xie and Dongliang Zhang Analyzing the Chain of Trust Model Based on Entity Dependence
41 Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev and Gerhard Fohler Towards Transparent Control-Flow Integrity in Safety-Critical Systems
47 Haoyu Ma, Tian Jianwen, Debin Gao and Chunfu Jia Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel
48 Alberto Blanco-Justicia and Josep Domingo-Ferrer Privacy-Preserving Computation of the Earth Mover’s Distance
52 Saihua Cai, Jinfu Chen, Xinru Li and Bo Liu Minimal rare-pattern-based outlier detection method for data streams by considering anti-monotonic constraints
57 Zuchao Ma, Liang Liu and Weizhi Meng ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks
59 Jamie Pont, Budi Arief and Julio Hernandez-Castro Why Current Statistical Approaches to Ransomware Detection Fail
61 Rouzbeh Behnia, Attila A Yavuz, Muslum Ozgur Ozmen and Tsz Hon Yuen Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT
65 Pier Paolo Tricomi and Mauro Conti PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition
69 Abba Garba, Arne Bochem, and Benjamin Leiding BlockVoke-Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust
71 Xiaoqi Li, Ting Chen, Xiapu Luo and Jiangshan Yu Characterizing Erasable Accounts in Ethereum
73 Soma Murata, Daiki Miyahara, Takaaki Mizuki and Hideaki Sone Public-PEZ Cryptography
76 Xin Chen and Liang Feng Zhang Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials
77 Jorge Sanz Maroto, Haoyu Liu and Paul Patras On the Struggle Bus: A Detailed Security Analysis of the m-tickets App
81 Rujia Li, Qin Wang, Feng Liu, Qi Wang and David Galindo An Accountable Decryption System Based on Privacy-Preserving Smart Contracts
82 Junming Ke, Pawel Szalachowski, Jianying Zhou and Qiuliang Xu Formalizing Bitcoin Crashes with Universally Composable Security