Login / Signup
ESORICS (1)
2014
2018
2020
2024
2014
2024
Keyphrases
Publications
volume 14344, 2024
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I
ESORICS (1)
14344 (2024)
2023
Katharina Boudgoust
,
Akira Takahashi
Sequential Half-Aggregation of Lattice-Based Signatures.
ESORICS (1)
(2023)
Qi Wang
,
Haodong Huang
,
Juyan Li
,
Qi Yuan
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation.
ESORICS (1)
(2023)
You Lyu
,
Shengli Liu
Two-Message Authenticated Key Exchange from Public-Key Encryption.
ESORICS (1)
(2023)
Ivan De Oliveira Nunes
,
Peter Rindal
,
Maliheh Shirvanian
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems.
ESORICS (1)
(2023)
Yavuz Akin
,
Jakub Klemsa
,
Melek Önen
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth.
ESORICS (1)
(2023)
Marcel Tiepelt
,
Edward Eaton
,
Douglas Stebila
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements.
ESORICS (1)
(2023)
Ivo Maffei
,
A. W. Roscoe
Optimally-Fair Multi-party Exchange Without Trusted Parties.
ESORICS (1)
(2023)
Yukimasa Sugizaki
,
Hikaru Tsuchida
,
Takuya Hayashi
,
Koji Nuida
,
Akira Nakashima
,
Toshiyuki Isshiki
,
Kengo Mori
Threshold Fully Homomorphic Encryption Over the Torus.
ESORICS (1)
(2023)
Minkyu Kim
,
Hyung Tae Lee
Code-Based Secret Handshake Scheme, Revisited.
ESORICS (1)
(2023)
Aysajan Abidin
,
Erik Pohle
,
Bart Preneel
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC.
ESORICS (1)
(2023)
Jules Maire
,
Damien Vergnaud
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems.
ESORICS (1)
(2023)
Zhiyuan An
,
Haibo Tian
,
Chao Chen
,
Fangguo Zhang
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience.
ESORICS (1)
(2023)
Quang Cao
,
Hong-Yen Tran
,
Son Hoang Dau
,
Xun Yi
,
Emanuele Viterbo
,
Chen Feng
,
Yu-Chih Huang
,
Jingge Zhu
,
Stanislav Kruglik
,
Han Mao Kiah
Committed Private Information Retrieval.
ESORICS (1)
(2023)
Jules Maire
,
Damien Vergnaud
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head.
ESORICS (1)
(2023)
Lin Zhu
,
Qiang-Sheng Hua
,
Yi Chen
,
Hai Jin
Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption.
ESORICS (1)
(2023)
Sohyun Jeon
,
Hyang-Sook Lee
,
Jeongeun Park
Practical Randomized Lattice Gadget Decomposition with Application to FHE.
ESORICS (1)
(2023)
Feng Li
,
Jianfeng Ma
,
Yinbin Miao
,
Pengfei Wu
,
Xiangfu Song
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage.
ESORICS (1)
(2023)
Tae Min Ahn
,
Kang Hoon Lee
,
Joon Soo Yoo
,
Ji Won Yoon
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain.
ESORICS (1)
(2023)
Théophile Brézot
,
Paola de Perthuis
,
David Pointcheval
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE.
ESORICS (1)
(2023)
Laura Hetz
,
Thomas Schneider
,
Christian Weinert
Scaling Mobile Private Contact Discovery to Billions of Users.
ESORICS (1)
(2023)
Dennis Dayanikli
,
Anja Lehmann
Password-Based Credentials with Security Against Server Compromise.
ESORICS (1)
(2023)
Carmen Wabartha
,
Julian Liedtke
,
Nicolas Huber
,
Daniel Rausch
,
Ralf Küsters
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations.
ESORICS (1)
(2023)
Ravi Anand
,
Subhadeep Banik
,
Andrea Caforio
,
Kazuhide Fukushima
,
Takanori Isobe
,
Shinsaku Kiyomoto
,
Fukang Liu
,
Yuto Nakano
,
Kosei Sakamoto
,
Nobuyuki Takeuchi
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
ESORICS (1)
(2023)
2022
Fucai Luo
,
Saif Al-Kuwari
,
Haiyan Wang
,
Weihong Han
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
ESORICS (1)
(2022)
Xinjing Liu
,
Zhuo Ma
,
Yang Liu
,
Zhan Qin
,
Junwei Zhang
,
Zhuzhu Wang
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
ESORICS (1)
(2022)
Huy Quoc Le
,
Dung Hoang Duong
,
Willy Susilo
,
Josef Pieprzyk
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
ESORICS (1)
(2022)
Özgür Kesim
,
Christian Grothoff
,
Florian Dold
,
Martin Schanzenbach
Zero-Knowledge Age Restriction for GNU Taler.
ESORICS (1)
(2022)
Nicholas Stifter
,
Aljosha Judmayer
,
Philipp Schindler
,
Edgar R. Weippl
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork.
ESORICS (1)
(2022)
Yue Qin
,
Ruoyu Ding
,
Chi Cheng
,
Nina Bindel
,
Yanbin Pan
,
Jintai Ding
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange.
ESORICS (1)
(2022)
Yi Xie
,
Mengdie Huang
,
Xiaoyu Zhang
,
Changyu Dong
,
Willy Susilo
,
Xiaofeng Chen
GAME: Generative-Based Adaptive Model Extraction Attack.
ESORICS (1)
(2022)
Massimiliano Albanese
,
Karin Johnsgard
,
Vipin Swarup
A Formal Model for Credential Hopping Attacks.
ESORICS (1)
(2022)
Hengxian Song
,
Jing Liu
,
Jianing Yang
,
Xinyu Lei
,
Gang Xue
Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism.
ESORICS (1)
(2022)
Mauro Conti
,
Denis Donadel
,
Radha Poovendran
,
Federico Turrin
EVExchange: A Relay Attack on Electric Vehicle Charging System.
ESORICS (1)
(2022)
Ricardo Mendes
,
Mariana Cunha
,
João P. Vilela
,
Alastair R. Beresford
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences.
ESORICS (1)
(2022)
Maxime Buser
,
Rafael Dowsley
,
Muhammed F. Esgin
,
Shabnam Kasra Kermanshahi
,
Veronika Kuchta
,
Joseph K. Liu
,
Raphaël C.-W. Phan
,
Zhenfei Zhang
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
ESORICS (1)
(2022)
Stéphanie Delaune
,
Joseph Lallemand
One Vote Is Enough for Analysing Privacy.
ESORICS (1)
(2022)
Francesca Falzon
,
Kenneth G. Paterson
An Efficient Query Recovery Attack Against a Graph Encryption Scheme.
ESORICS (1)
(2022)
Zhenyuan Li
,
Jun Zeng
,
Yan Chen
,
Zhenkai Liang
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
ESORICS (1)
(2022)
Xiaoyi Chen
,
Yinpeng Dong
,
Zeyu Sun
,
Shengfang Zhai
,
Qingni Shen
,
Zhonghai Wu
Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
ESORICS (1)
(2022)
Mahawaga Arachchige Pathum Chamikara
,
Dongxi Liu
,
Seyit Camtepe
,
Surya Nepal
,
Marthie Grobler
,
Peter Bertók
,
Ibrahim Khalil
Local Differential Privacy for Federated Learning.
ESORICS (1)
(2022)
Liron David
,
Avinatan Hassidim
,
Yossi Matias
,
Moti Yung
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic.
ESORICS (1)
(2022)
Chengyu Lin
,
Zeyu Liu
,
Tal Malkin
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE.
ESORICS (1)
(2022)
Alesia Chernikova
,
Nicolò Gozzi
,
Simona Boboila
,
Priyanka Angadi
,
John Loughner
,
Matthew Wilden
,
Nicola Perra
,
Tina Eliassi-Rad
,
Alina Oprea
Cyber Network Resilience Against Self-Propagating Malware Attacks.
ESORICS (1)
(2022)
Xin Yin
,
Zhen Liu
,
Guomin Yang
,
Guoxing Chen
,
Haojin Zhu
Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
ESORICS (1)
(2022)
Ankit Gangwal
,
Shubham Singh
,
Riccardo Spolaor
,
Abhijeet Srivastava
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.
ESORICS (1)
(2022)
Kurt Friday
,
Elie F. Kfoury
,
Elias Bou-Harb
,
Jorge Crichigno
INC: In-Network Classification of Botnet Propagation at Line Rate.
ESORICS (1)
(2022)
Long Meng
,
Liqun Chen
A Blockchain-Based Long-Term Time-Stamping Scheme.
ESORICS (1)
(2022)
Yi Liu
,
Qi Wang
,
Siu-Ming Yiu
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability.
ESORICS (1)
(2022)
volume 13554, 2022
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I
ESORICS (1)
13554 (2022)