International Conference on
Applied Cryptography and Network Security

List of Best Student Papers (2003 - 2022)

Using Feedback to Improve Masquerade Detection
Kwong Yung
Stanford University, USA 2003
Evaluating Security of Voting Schemes in the Universal Composability Framework
Jens Groth
University of Aarhus, Denmark 2004
Security Measurements of Steganographic Systems
Weiming Zhang, Shiqu Li
University of Information Engineeing, China 2004
Public Key Cryptography sans Certificates in Ad Hoc Networks
Nitesh Saxena
University of California at Irvine, USA 2006
Adaptive Detection of Local Scanners
Ahren Studer, Chenxi Wang
Carnegie Mellon University, USA 2006
Midpoints versus Endpoints: From Protocols to Firewalls
Diana von Bidder-Senn, David Basin, Germano Caronni
ETH Zurich, Switzerland 2007
On the Effectiveness of Internal Patching Against File-Sharing Worms
Liang Xie, Hui Song, Suncun Zhu
Pennsylvania State University, USA 2008
Secure Hamming Distance Based Computation and Its Applications
Ayman Jarrous, Benny Pinkas
University of Haifa, Israel 2009
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption
Aurelie Bauer, Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud ENS, France 2010
Security Notions for Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Mario Strefler ENS, France 2011
Wide Collisions in Practice
Xin Ye, Thomas Eisenbarth
Florida Atlantic University, USA 2012
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
Darmstadt University of Technology, Germany
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
Erich Wenger
Graz University of Technology, Austria
Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser
TELECOM-ParisTech, France
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Brown University, USA
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking
Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Sapienza University of Rome, Italy
Parallel Implementation of BDD Enumeration for LWE
Elena Kirshanova, Alexander May, Friedrich Wiemer Ruhr University Bochum, Germany
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
Carlos Aguilar-Melchor, Martin Albrecht, Thomas Ricosset
Universite de Toulouse, France
Non-interactive Zaps of Knowledge
Georg Fuchsbauer, Michele Orru
INRIA, France
Faster Multiplication in Z2m [x] on Cortex-M4 to Speed up NIST PQC Candidates
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
Radboud University, Netherlands
Generic and Practical Key Establishment from Lattice
Zhengzhong Jin, Yunlei Zhao
Fudan University, China
When TLS Meets Proxy on Mobile
Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury
University of Iowa, USA
Unlinkable and Invisible γ-Sanitizable Signatures
Angele Bossuat, Xavier Bultel
IRISA, France
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan
Northeastern University, USA

Maintained by Jianying Zhou
Last updated in July 2022