Accepted Papers

Accepted Papers

First Round

MemShield: GPU-assisted software memory encryption - Pierpaolo Santucci (Epigenesys s.r.l.), Emiliano Ingrassia (Epigenesys s.r.l.), Giulio Picierro (University of Rome Tor Vergata) and Marco Cesati (University of Rome Tor Vergata)

Human Factors in Homograph Attack Recognition - Tran Phuong Thao (The University of Tokyo), Yukiko Sawaya (KDDI Research, Inc.), Hoang-Quoc Nguyen-Son (KDDI Research, Inc.), Akira Yamada (KDDI Research, Inc.), Ayumu Kubota (KDDI Research, Inc.), Tran Van Sang (The University of Tokyo) and Rie Shigetomi Yamaguchi (The University of Tokyo)

A Practical System for Privacy-preserving Video Surveillance - Elmahdi Bentafat (Hamad Bin Khalifa University), Muhammad Mazhar Ullah Rathore (Hamad Bin Khalifa University) and Spiridon Bakiras (Hamad Bin Khalifa University)

Biometric-Authenticated Searchable Encryption - Daniel Gardham (University of Surrey), Mark Manulis (University of Surrey) and Constantin Catalin Dragan (University of Surrey)

Multi-Device for Signal - Sébastien Campion (Inria), Julien Devigne (DGA Maîtrise de l'information), Céline Duguey, (DGA Maîtrise de l'information/Irisa), Pierre-Alain Fouque (Irisa)

Saber on ESP32 - Bin Wang (University of Chinese Academy of Sciences), Xiaozhuo Gu (University of Chinese Academy of Sciences) and Yingshan Yang (University of Chinese Academy of Sciences)

Offline Witness Encryption with Semi-Adaptive Security - Peter Chvojka (Bergische Universit ̈at Wuppertal), Tibor Jager (Bergische Universit ̈at Wuppertal) and Saqib Kakvi (Bergische Universit ̈at Wuppertal)

Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069 - Maximilian Hils (University of Innsbruck) and Rainer Böhme (University of Innsbruck)

Rotational Cryptanalysis on MAC Algorithm - Chaskey Liliya Kraleva (KU Leuven), Tomer Ashur (KU Leuven / TU Eindhoven) and Vincent Rijmen (KU Leuven)

Quality Evaluation of Cyber Threat Intelligence Feeds - Harm Griffioen (TU Delft), Tim Booij (TU Delft) and Christian Doerr (TU Delft)

Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority - Marina Blanton (University at Buffalo), Ahreum Kang (Soonchunhyang University) and Chen Yuan (University at Buffalo)

Publicly Evaluatable Perceptual Hashing - Rosario Gennaro (The City College of New York), David Hadaller (The City College of New York), Tahereh Jafarikhah (The City College of New York), Zhuobang Liu (The City College of New York), William E. Skeith (The City College of New York) and Anastasiia Timashova (The City College of New York)

Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities - Karim Eldefrawy (SRI International), Tancrede Lepoint (Google LLC) and Antonin Leroux (Ecole Polytechnique)


Second Round

A breach into the Authentication with Built-in Camera (ABC) Protocol - Cezara Benegui (University of Bucharest), Radu Tudor Ionescu (University of Bucharest)

An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks - Keitaro Hiwatashi (The University of Tokyo), Satsuya Ohata (Digital Garage Inc.) and Koji Nuida (The University of Tokyo)

Towards Automated Augmentation and Instrumentation for Legacy Cryptographic Executables - Karim Eldefrawy (SRI International), Michael Locasto (SRI International), Norrathep Rattanavipanon (Prince of Songkla University), and Hassen Saidi (SRI International)

Powerless Security - A Security Analysis of in-Home Powerline Communications based on HomePlug AV2 - Stefan Hoffmann (University of Applied Sciences Ruhr West), Jens Müller (Ruhr University Bochum), Jörg Schwenk (Ruhr University Bochum) and Gerd Bumiller (University of Applied Sciences Ruhr West)

Efficient Anonymous Multi-Group Broadcast Encryption - Intae Kim (University of Wollongong), Seong Oun Hwang (Gachon University), Willy Susilo (University of Wollongong), Joonsang Baek (University of Wollongong) and Jongkil Kim (University of Wollongong)

Super Root: A New Stealthy Rooting Technique on ARM Devices - Zhangkai Zhang (Beihang University), Yueqiang Cheng (Baidu Security) and Zhoujun Li (Beihang University)

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution - Viet Vo (Monash University), Shangqi Lai (Monash University), Xingliang Yuan (Monash University), Shi-Feng Sun (Monash University), Surya Nepal (Data61, CSIRO), and Joseph K. Liu (Monash University)

Minting Mechanism for Proof of Stake Blockchains - Dominic Deuber (Friedrich Alexander Universität Erlangen-Nürnberg), Nico Döttling (CISPA Helmholtz Center), Bernardo Magri (Concordium Blockchain Research Center, Aarhus University), Giulio Malavolta (UC Berkeley, Carnegie Mellon University), and Sri Aravinda Krishnan Thyagarajan (Friedrich Alexander Universität Erlangen-Nürnberg)

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes - Fabio De Gaspari (Sapienza University of Rome), Dorjan Hitaj (Sapienza University of Rome), Giulio Pagnotta (Sapienza University of Rome), Lorenzo De Carli (Worcester Polytechnic Institute), and Luigi V. Mancini (Sapienza University of Rome)

New Methods and Abstractions for RSA-Based Forward Secure Signatures - Susan Hohenberger (Johns Hopkins University) and Brent Waters (University of Texas at Austin and NTT Research)

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model - Huy Quoc Le (University of Wollongong), Dung Hoang Duong (University of Wollongong), Willy Susilo (University of Wollongong) and Josef Pieprzyk (Data61, CSIRO)

TrollThrottle — Raising the Cost of Astroturfing - Ilkan Esiyok (CISPA Helmholtz Center for Information Security), Lucjan Hanzlik (CISPA Helmholtz Center for Information Security, Stanford University), Robert Kuennemann (CISPA Helmholtz Center for Information Security), Lena Marie Budde (Saarland University) and Michael Backes (CISPA Helmholtz Center for Information Security)

How Not to Create an Isogeny-Based PAKE - Reza Azarderakhsh (Florida Atlantic University), David Jao (University of Waterloo), Brian Koziel (Florida Atlantic University), Jason LeGrow (University of Waterloo), Vladimir Soukharev (Infosec Global) and Oleg Taraskin (Waves Platform)

Random Walks and Concurrent Zero-Knowledge - Anand Aiyer (Stony Brook University), Xiao Liang (Stony Brook University), Nilu Nalini and Omkant Pandey (Stony Brook University)

When TLS Meets Proxy on Mobile - Joyanta Debnath (The University of Iowa), Sze Yiu Chau (The Chinese University of Hong Kong) and Omar Chowdhury (The University of Iowa)

ACE in Chains : How Risky is CBC Encryption of Binary Executable Files? - Rintaro Fujita (University of Hyogo), Takanori Isobe (University of Hyogo) and Kazuhiko Minematsu (NEC)

Biolocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein - F. Betül Durak (Robert Bosch LLC - Research and Technology Center), Loïs Huguenin- Dumittan (Ecole Polytechnique Fédérale de Lausanne) and Serge Vaudenay (Ecole Polytechnique Fédérale de Lausanne)

Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic - Hilder Vitor Lima Pereira (University of Luxembourg)

Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes - Loïs Huguenin-Dumittan (LASEC, EPFL) and Serge Vaudenay (LASEC, EPFL)

Game Theory-Based Approach for Defense against APTs - Juan E. Rubio (University of Malaga), Cristina Alcaraz (University of Malaga) and Javier Lopez (University of Malaga)

The Lattice-Based Digital Signature Scheme qTESLA - Erdem Alkim (Ondokuz Mayis University), Paulo S. L. M. Barreto (University of Washington Tacoma), Nina Bindel (University of Waterloo), Juliane Krämer (TU Darmstadt), Patrick Longa (Microsoft Research) and Jefferson E. Ricardini (LG Electronics)

Tweaking Key-Alternating Feistel Block Ciphers - Hailun Yan (Ecole Polytechnique Fédérale de Lausanne), Lei Wang (Shanghai Jiao Tong University), Yaobin Shen (Shanghai Jiao Tong University) and Xuejia Lai (Shanghai Jiao Tong University)

Improving the Efficiency of Re-Randomizable and Replayable CCA Secure Public Key Encryption - Antonio Faonio (IMDEA Software Institute) and Dario Fiore (IMDEA Software Institute)

A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals - Niek J. Bouman (Roseman Labs) and Niels de Vreede (Technische Universiteit Eindhoven)

Cluster-Based Anonymization of Knowledge Graphs - Anh-Tu Hoang (University of Insubria), Barbara Carminati (University of Insubria) and Elena Ferrari (University of Insubria)

Same Point Composable and Nonmalleable Obfuscated Point Functions - Peter Fenteany (University of Connecticut) and Benjamin Fuller (University of Connecticut)

Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors - Aaron Hutchinson (University of Waterloo), Jason LeGrow (University of Waterloo), Brian Koziel (Florida Atlantic University) and Reza Azarderakhsh (Florida Atlantic University)

Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode - Shoichi Hirose (University of Fukui), Yu Sasaki (NTT Secure Platform Laboratories) and Hirotaka Yoshida (National Institute of Advanced Industrial Science and Technology)

On the deniability of Signal communications - Rosario Gennaro (City University of New York), Bertrand Ithurburn (City University of New York), Hugo Krawczyk (Algorand Foundation) and Nihal Vatandas (City University of New York)

A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes - Xuan Thanh Do (Vietnam National University), Duong Hieu Phan (University of Limoges) and Moti Yung (Google Research and Columbia University)

Timed Signatures and Zero-Knowledge Proofs –Timestamping in the Blockchain Era– - Aydin Abadi (The University of Edinburgh), Michele Ciampi (The University of Edinburgh), Aggelos Kiayias (The University of Edinburgh and IOHK) and Vassilis Zikas (The University of Edinburgh and IOHK)

Secure Two-Party Computation in a Quantum World - Niklas Büscher (TU Darmstadt), Daniel Demmler (Universität Hamburg), Nikolaos P. Karvelas (TU Darmstadt), Stefan Katzenbeisser (Universität Passau), Juliane Krämer (TU Darmstadt), Deevashwer Rathee (IIT (BHU) Varanasi), Thomas Schneider (TU Darmstadt) and Patrick Struck (TU Darmstadt)

Secure and Efficient Delegation of Elliptic-Curve Pairing - Giovanni Di Crescenzo (Perspecta Labs Inc.), Matluba Khodjaeva (CUNY John Jay College of Criminal Justice), Delaram Kahrobaei (University of York) and Vladimir Shpilrain (City University of New York)