


default search action
25th ESORICS 2020: Guildford, UK - Part II
- Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3
Formal Modelling
- Véronique Cortier, Stéphanie Delaune, Jannik Dreier:
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols. 3-22 - Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When Is a Test Not a Proof? 23-41 - Nimrod Gilboa Markevich, Avishai Wool
:
Hardware Fingerprinting for the ARINC 429 Avionic Bus. 42-62
Applied Cryptography I
- Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara
, Yusuke Sakai, Shota Yamada:
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition. 65-85 - Jeongeun Park
, Mehdi Tibouchi:
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval. 86-106 - Willy Susilo
, Dung Hoang Duong, Huy Quoc Le
, Josef Pieprzyk
:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. 107-127
Analyzing Attacks
- Botao Hou, Yongqiang Li, Haoyue Zhao, Bin Wu:
Linear Attack on Round-Reduced DES Using Deep Learning. 131-145 - Qifei Zhou, Rong Zhang, Bo Wu, Weiping Li, Tong Mo:
Detection by Attack: Detecting Adversarial Samples by Undercover Attack. 146-164 - Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems. 165-184 - Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz
:
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. 185-205
System Security II
- Vladimir Sedlacek
, Jan Jancar, Petr Svenda:
Fooling Primality Tests on Smartcards. 209-229 - Damián Aparicio-Sánchez, Santiago Escobar
, Raúl Gutiérrez
, Julia Sapiña:
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA. 230-250 - Yu-Hsi Chiang, Hsu-Chun Hsiao
, Chia-Mu Yu
, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. 251-271 - Tobias Urban
, Matteo Große-Kampmann
, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces. 272-291
Post-quantum Cryptography
- Sebastian Paul, Patrik Scheible:
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. 295-316 - Zhuoran Zhang, Fangguo Zhang
, Haibo Tian:
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory. 317-335 - Xavier Boyen, Thomas Haines, Johannes Müller
:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. 336-356 - Wenling Liu, Zhen Liu, Khoa Nguyen
, Guomin Yang
, Yu Yu:
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. 357-377 - Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
:
Post-Quantum Adaptor Signatures and Payment Channel Networks. 378-397
Security Analysis
- Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
:
Linear-Complexity Private Function Evaluation is Practical. 401-420 - Stefano Calzavara
, Pietro Ferrara
, Claudio Lucchese:
Certifying Decision Trees Against Evasion Attacks by Program Analysis. 421-438 - Rayan Mosli, Matthew Wright
, Bo Yuan, Yin Pan
:
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization. 439-459 - Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu
:
Understanding Object Detection Through an Adversarial Lens. 460-481
Applied Cryptography II
- Jiaxin Pan
, Magnus Ringerud
:
Signatures with Tight Multi-user Security from Search Assumptions. 485-504 - Adam Janovsky, Matús Nemec
, Petr Svenda, Peter Sekan, Vashek Matyas:
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys. 505-524 - Robert Künnemann, Hamed Nemati
:
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation. 525-545 - Anamaria Costache, Kim Laine, Rachel Player:
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE. 546-565
Blockchain I
- Hanyi Sun, Na Ruan, Chunhua Su:
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. 569-589 - Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros:
Updatable Blockchains. 590-609 - Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution. 610-629
Applied Cryptography III
- Yunlei Zhao:
Identity-Based Authenticated Encryption with Identity Confidentiality. 633-653 - Anders P. K. Dalskov
, Claudio Orlandi, Marcel Keller
, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. 654-673 - Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura
:
On Private Information Retrieval Supporting Range Queries. 674-694
Blockchain II
- Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou
:
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely. 697-712 - Yuan Lu, Qiang Tang, Guiling Wang:
Generic Superlight Client for Permissionless Blockchains. 713-733 - Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac:
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit. 734-755

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.