ACNS
 
International Conference on
Applied Cryptography and Network Security
                                 

List of Best Student Papers (2003 - 2023)


Using Feedback to Improve Masquerade Detection
Kwong Yung
Stanford University, USA 2003
Evaluating Security of Voting Schemes in the Universal Composability Framework
Jens Groth
University of Aarhus, Denmark 2004
Security Measurements of Steganographic Systems
Weiming Zhang, Shiqu Li
University of Information Engineeing, China 2004
Public Key Cryptography sans Certificates in Ad Hoc Networks
Nitesh Saxena
University of California at Irvine, USA 2006
Adaptive Detection of Local Scanners
Ahren Studer, Chenxi Wang
Carnegie Mellon University, USA 2006
Midpoints versus Endpoints: From Protocols to Firewalls
Diana von Bidder-Senn, David Basin, Germano Caronni
ETH Zurich, Switzerland 2007
On the Effectiveness of Internal Patching Against File-Sharing Worms
Liang Xie, Hui Song, Suncun Zhu
Pennsylvania State University, USA 2008
Secure Hamming Distance Based Computation and Its Applications
Ayman Jarrous, Benny Pinkas
University of Haifa, Israel 2009
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption
Aurelie Bauer, Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud ENS, France 2010
Security Notions for Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Mario Strefler ENS, France 2011
Wide Collisions in Practice
Xin Ye, Thomas Eisenbarth
Florida Atlantic University, USA 2012
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
Darmstadt University of Technology, Germany
2013
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
Erich Wenger
Graz University of Technology, Austria
2013
Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser
TELECOM-ParisTech, France
2014
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Brown University, USA
2015
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking
Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Sapienza University of Rome, Italy
2015
Parallel Implementation of BDD Enumeration for LWE
Elena Kirshanova, Alexander May, Friedrich Wiemer Ruhr University Bochum, Germany
2016
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
Carlos Aguilar-Melchor, Martin Albrecht, Thomas Ricosset
Universite de Toulouse, France
2017
Non-interactive Zaps of Knowledge
Georg Fuchsbauer, Michele Orru
INRIA, France
2018
Faster Multiplication in Z2m [x] on Cortex-M4 to Speed up NIST PQC Candidates
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
Radboud University, Netherlands
2019
Generic and Practical Key Establishment from Lattice
Zhengzhong Jin, Yunlei Zhao
Fudan University, China
2019
When TLS Meets Proxy on Mobile
Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury
University of Iowa, USA
2020
Unlinkable and Invisible γ-Sanitizable Signatures
Angele Bossuat, Xavier Bultel
IRISA, France
2021
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan
Northeastern University, USA
2022
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding
Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoît Gérard
CNRS, France
2023
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers
Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao
Carnegie Mellon University, USA
National Taiwan University, Taiwan
2023




Maintained by Jianying Zhou
Last updated in July 2023