<
 
 

Accepted Papers

A General Framework for Redactable Signatures and New Constructions
David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Anonymous Authentication Scheme based on PUF
Łukasz Krzywiecki
Apollo: End-to-End Veriable Voting Protocol using Mixnet & Hidden Tweaks
Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang
Attribute-Based Two-Tier Signatures: Definition and Construction
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski, Pascal Junod
Detecting obfuscated suspicious JavaScript based on information-theoretic measures and novelty detection
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
Faster ECC over F_{2^521-1} (feat. NEON)
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim
Higher-Order Cryptanalysis of LowMC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Improved Impossible Differential Attack on Reduced-Round LBlock
Ning Wang, Xiaoyun Wang, Keting Jia
Improving fuzzing using software complexity metrics
Maksim O. Shudrak, Vyacheslav V. Zolotarev
Integral Attack against Bit-Oriented Block Ciphers
Huiling Zhang, Wenling Wu, Yanfeng Wang
Learning with Errors in the Exponent
Oezguer Dagdelen, Sebastian Gajek, Florian Goepfert
Let me prove it to you: RO PUFs are provably learnable
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
Tomoyuki Tanigaki, Noboru Kunihiro
New Efficient Padding Methods Secure against Padding Oracle Attacks
HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong
On Differentially Private Online Collaborative Recommendation Systems
Seth Gilbert, Xiao Liu, Haifeng Yu
On the (In)Efficiency of Non-Interactive Secure Multiparty Computation
Maki Yoshida, Satoshi Obana
On the $k$-error Linear Complexity for $p^n$-periodic Binary Sequences via Hypercube Theory
Jianqin Zhou, Wanquan Liu, Xifeng Wang, Guanglu Zhou
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
Stack Layout Randomization with Minimal Rewriting of Android Binaries
Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang
Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves
Srinivasa Rao Subramanya Rao
Two Lattice-based Differential Fault Attacks against ECDSA with wNAF Algorithm
Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng
Uncloaking rootkits on mobile devices with a hypervisor-based detector
Julian Vetter, Matthias Petschik-Junker, Jan Nordholz, Michael Peter, Janis Danisevskis