Using Feedback to Improve
Masquerade Detection |
Kwong Yung |
Stanford University, USA | 2003 |
Evaluating
Security of Voting Schemes in the Universal Composability Framework |
Jens
Groth |
University of Aarhus, Denmark | 2004 |
Security
Measurements of Steganographic Systems |
Weiming
Zhang, Shiqu Li |
University of Information Engineeing, China | 2004 |
Public
Key Cryptography sans Certificates in Ad Hoc Networks |
Nitesh
Saxena |
University of California at Irvine, USA | 2006 |
Adaptive
Detection of Local Scanners |
Ahren
Studer, Chenxi Wang |
Carnegie Mellon University, USA | 2006 |
Midpoints
versus Endpoints: From Protocols to Firewalls |
Diana
von Bidder-Senn, David Basin,
Germano Caronni |
ETH Zurich, Switzerland | 2007 |
On
the Effectiveness of Internal Patching Against File-Sharing Worms |
Liang Xie, Hui Song, Suncun Zhu |
Pennsylvania State University, USA | 2008 |
Secure
Hamming Distance Based Computation and Its Applications |
Ayman Jarrous, Benny Pinkas |
University of Haifa, Israel | 2009 |
On
the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption |
Aurelie Bauer, Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud | ENS, France | 2010 |
Security
Notions for Broadcast Encryption |
Duong Hieu Phan, David Pointcheval, Mario Strefler | ENS, France | 2011 |
Wide
Collisions in Practice |
Xin Ye, Thomas Eisenbarth |
Florida Atlantic University, USA | 2012 |
Cryptophia's
Short Combiner for Collision-Resistant Hash Functions |
Arno Mittelbach |
Darmstadt
University of Technology, Germany |
2013 |
Hardware
Architectures for MSP430-Based Wireless Sensor Nodes Performing
Elliptic Curve Cryptography |
Erich Wenger |
Graz
University of Technology, Austria |
2013 |
Detecting
Hidden Leakages |
Amir
Moradi, Sylvain Guilley, Annelie
Heuser |
TELECOM-ParisTech,
France |
2014 |
Zero-Knowledge
Authenticated Order Queries and Order Statistics on a List |
Esha Ghosh, Olga Ohrimenko,
Roberto Tamassia |
Brown
University, USA |
2015 |
Violating
Consumer Anonymity: Geo-locating Nodes in Named Data Networking |
Alberto Compagno, Mauro Conti,
Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik |
Sapienza
University of Rome, Italy |
2015 |
Parallel
Implementation of BDD Enumeration for LWE |
Elena Kirshanova, Alexander May, Friedrich Wiemer | Ruhr
University Bochum, Germany
|
2016 |
Sampling
from Arbitrary Centered Discrete Gaussians for Lattice-Based
Cryptography |
Carlos
Aguilar-Melchor, Martin Albrecht, Thomas
Ricosset |
Universite
de Toulouse, France |
2017 |
Non-interactive
Zaps of Knowledge |
Georg
Fuchsbauer, Michele Orru |
INRIA,
France |
2018 |
Faster Multiplication
in Z2m [x] on Cortex-M4 to
Speed up NIST PQC Candidates |
Matthias J. Kannwischer, Joost
Rijneveld, Peter Schwabe |
Radboud
University, Netherlands |
2019 |
Generic and Practical Key
Establishment from Lattice |
Zhengzhong Jin, Yunlei Zhao |
Fudan University, China |
2019 |
When
TLS Meets Proxy on Mobile |
Joyanta Debnath, Sze Yiu Chau,
Omar Chowdhury |
University
of Iowa, USA |
2020 |
Unlinkable
and Invisible γ-Sanitizable Signatures |
Angele Bossuat, Xavier Bultel |
IRISA,
France |
2021 |
ZLeaks:
Passive Inference Attacks on Zigbee based Smart Homes |
Narmeen Shafqat, Daniel J.
Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan
Ranganathan |
Northeastern
University, USA |
2022 |
BIKE
Key-Recovery: Combining Power Consumption Analysis and Information-Set
Decoding |
Agathe Cheriere, Nicolas Aragon,
Tania Richmond, Benoît Gérard |
CNRS,
France |
2023 |
Capturing
Antique Browsers in Modern Devices: A Security Analysis of Captive
Portal Mini-Browsers |
Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching
Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao |
Carnegie
Mellon University, USA National Taiwan University, Taiwan |
2023 |
Building
MPCitH-based Signatures from MQ, MinRank, and Rank SD |
Thibauld Feneuil |
Sorbonne
University, France |
2024 |
Self-Sovereign
Identity for Electric Vehicle Charging |
Adrian
Kailus, Dustin Kern,
Christoph Krauß |
Darmstadt University of
Applied Sciences, Germany |
2024 |