


default search action
27th ISC 2024: Arlington, VA, USA - Part I
- Nicky Mouha
, Nick Nikiforakis
:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15257, Springer 2025, ISBN 978-3-031-75756-3
Blockchain
- Kundu Chen, Jie Luo, Yi Lu, Zhongyun Zhang, Wenbo Zhang, Xudong Wang, Pan Li, Jun Zhao:
The Formal Verification of Aptos Coin. 3-22 - Ghada Almashaqbeh, Anca Nitulescu:
Anonymous, Timed and Revocable Proxy Signatures. 23-43
Symmetric-Key Cryptography
- Yong Liu
, Zejun Xiang
, Shasha Zhang
, Xiangyong Zeng
:
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128. 47-66 - Xiangyang Zhang
, Yaobin Shen
, Lei Wang
:
Security Analysis of CMAC in the Multi-user Model. 67-86 - Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba:
Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys. 87-103
Machine Learning
- Jiacheng Xu
, Jianpeng Hu, Chunqing Yu, Chengxiang Tan:
Optimizing Label-Only Membership Inference Attacks by Global Relative Decision Boundary Distances. 107-126 - Kejun Zhang, Yutuo Song
, Shaofei Xu, Pengcheng Li, Rong Qian, Pengzhi Han, Lingyun Xu:
Risk of Text Backdoor Attacks Under Dataset Distillation. 127-144
Mobile Security and Trusted Execution
- Alex Le Blanc, Ivan Pustogarov:
Emulating Android Device Drivers via Borrowed Execution Context. 147-167
Software Security
- Chengxiang Liao, Ruipeng Wang, Yuwei Li, Juxing Chen, Yang Li, Zulie Pan:
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling. 171-189 - Jingzi Meng, Yuewu Wang, Lingguang Lei, Chunjing Kou, Peng Wang:
A Lightweight Defense Scheme Against Usermode Helper Privilege Escalation Using Linux Capability. 190-208
Multi-Party Computation
- Shohei Kaneko
, Pascal Lafourcade
, Lola-Baie Mallordy
, Daiki Miyahara
, Maxime Puys
, Kazuo Sakiyama
:
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles. 211-231 - Ahmed Zawia, M. Anwar Hasan:
ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination. 232-251 - Yan Xu, Guizhen Zhu, Huaxiong Wang, Li-Ping Wang:
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding. 252-272 - Charles Gouert
, Mehmet Ugurbil
, Dimitris Mouris
, Miguel de Vega, Nektarios Georgios Tsoutsos
:
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations. 273-293 - Antoine Urban
, Matthieu Rambaud
:
Robust Multiparty Computation from Threshold Encryption Based on RLWE. 294-314 - Ying Liu
, Zhihao Li
, Ruida Wang
, Xianhui Lu
, Kunpeng Wang
:
Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT. 315-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.