Accepted Papers
FULL PAPER
Paper ID | Paper Title | Authors | Affiliation |
---|---|---|---|
2 | Further Cryptanalysis of a Type of RSA Variants | Gongyu Shi, Geng Wang and Dawu Gu | Shanghai Jiao Tong University |
3 | Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs | Yongge Wang and Qutaibah Malluhi | UNC Charlotte, Qatar University |
11 | Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps | Binbin Tu, Min Zhang and Chen Yu | School of Cyber Science and Technology, Shandong University |
13 | Efficient Private Set Interaction Cardinality Protocol in the Reverse Unbalanced Setting | Hanyu Li and Ying Gao | School of Cyber Science and Technology, Beihang University |
26 | Batched Fully Homomorphic Encryption from TFHE | Yuting Jiang and Jianghong Wei | State Key Laboratory of Integrated Service Networks (ISN), Xidian University, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China |
27 | A Blockchain-based Mutual Authentication Protocol for Smart Home | Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang and Tao Xiang | Chongqing University |
29 | Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization | Jianzhang Chen, Haibo Tian and Fangguo Zhang | Sun Yat-sen University |
37 | Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-System Replay | Runhao Liu, Bo Yu, Baosheng Wang and Jianbin Ye | National University of Defense Technology |
38 | ATLAS: A Pratical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence | Yan Lin Aung, Martín Ochoa and Jianying Zhou | Singapore University of Technology and Design, ETH Zürich |
40 | OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control | Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph Liu and Surya Nepal | Monash University, Shanghai Jiao Tong University, China, CSIRO Data61 |
46 | HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud | Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng and Jiangtao Cui | Xidian University |
49 | GRUZ: Practical Resources Fair Exchange without Blockchain | Yongqing Xu, Kaiyi Zhang and Yu Yu | Department of Computer Science, Shanghai Jiao Tong University |
50 | Bilateral Privacy-Preserving Task Assignment with Personalised Participant Selection for Mobile Crowdsensing | Shijin Chen and Mingwu Zhang | Hubei University of Technology |
52 | Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck 32/64 | Lijun Lyu, Yi Tu and Yingjie Zhang | SKLOIS, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences School of Physical and Mathematical Sciences, Nanyang Technological University Beijing Institute of Mathematical Sciences and Applications;Yau Mathematical Sciences Center, Tsinghua University |
57 | Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization | Zhao Chen, Xianhui Lu, Dingding Jia and Bao Li | State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Institute of Information Engineering,CAS |
59 | Representing LLVM-IR in a Code Property Graph | Alexander Küchler and Christian Banse | Fraunhofer AISEC |
60 | Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing | Xue Tan, Di Xiao, Min Li and Hui Huang | Chongqing University |
63 | Witness Encryption from Smooth Projective Hashing | Yuzhu Wang and Mingwu Zhang | Guilin University of Electronic Technology, Hubei University of Technology |
65 | EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries | Almuthanna Alageel and Sergio Maffeis | Imperial College London |
66 | Dissecting Applications Uninstallers \& Removers: Are they effective? | Marcus Botacin and Andre Gregio | Federal University of Paraná, UFPR |
67 | Daric: A Storage Efficient Payment Channel with Punishment Mechanism | Arash Mirzaei, Amin Sakzad, Jiangshan Yu and Ron Steinfeld | Monash University |
SHORT PAPER
Paper ID | Paper Title | Authors | Affiliation |
---|---|---|---|
14 | More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model | Kyoichi Asano, Keita Emura and Atsushi Takayasu | The University of Electro-Communications, National Institute of Information and Communications Technology, The University of Tokyo |
17 | AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition | Shaofeng Wang, Bo Lang, Nan Xiao and Yikai Chen | Beihang University |
21 | QUIC Protocol with Post-Quantum Authentication | Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou and Sang-Yoon Chang | University of Colorado, Colorado Springs |
24 | CFL: Cluster Federated Learning in Large Scale Peer-to-Peer Networks | Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao and Xiaodong Lin | Xidian University, University of Guelph |
35 | The SAT-based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 | Yingying Li and Qichun Wang | Nanjing Normal University |
42 | Efficient scalar multiplication on koblitz curves with Pre-computation | Xiuxiu Li, Wei Yu and Kunpeng Wang | State Key Laboratory of Information Security, Institute of Information Engineering, CAS |
43 | Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files | Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey McDonald and Moti Yung | University of South Alabama, Auburn University, Columbia University |
53 | Why we need a theory of maliciousness: Towards clarifying the discussion on the feasibility of using hardware performance counters for malware detection | Marcus Botacin and Andre Gregio | Federal University of Paraná, UFPR |