| 2019 | A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. John Henry Castellanos, Jianying Zhou |
| 2019 | A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li |
| 2019 | Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung |
| 2019 | Benchmarking Privacy Preserving Scientific Operations. Abdelrahaman Aly, Nigel P. Smart |
| 2019 | Cryptanalysis of ForkAES. Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki |
| 2019 | DL-Extractable UC-Commitment Schemes. Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac |
| 2019 | DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia |
| 2019 | Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates. Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe |
| 2019 | Generic and Practical Key Establishment from Lattice. Zhengzhong Jin, Yunlei Zhao |
| 2019 | Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems. Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Nils Ole Tippenhauer |
| 2019 | Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length. Daniel Gardham, Mark Manulis |
| 2019 | Homomorphic Training of 30, 000 Logistic Regression Models. Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt |
| 2019 | Longitudinal Analysis of Misuse of Bitcoin. Karim Eldefrawy, Ashish Gehani, Alexandre Matton |
| 2019 | Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque |
| 2019 | Masking Fuzzy-Searchable Public Databases. Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi |
| 2019 | One Sample Ring-LWE with Rounding and Its Application to Key Exchange. Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang |
| 2019 | Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. Alexander Moch, Eik List |
| 2019 | PassGAN: A Deep Learning Approach for Password Guessing. Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz |
| 2019 | Password-Authenticated Public-Key Encryption. Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu |
| 2019 | Proxy Re-Encryption and Re-Signatures from Lattices. Xiong Fan, Feng-Hao Liu |
| 2019 | Public Immunization Against Complete Subversion Without Random Oracles. Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi |
| 2019 | Raptor: A Practical Lattice-Based (Linkable) Ring Signature. Xingye Lu, Man Ho Au, Zhenfei Zhang |
| 2019 | Rate-Optimizing Compilers for Continuously Non-malleable Codes. Sandro Coretti, Antonio Faonio, Daniele Venturi |
| 2019 | Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption. Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk |
| 2019 | Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu |
| 2019 | Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu |
| 2019 | Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing. Aner Ben-Efraim, Michael Nielsen, Eran Omri |
| 2019 | Unbounded Inner-Product Functional Encryption with Succinct Keys. Edouard Dufour Sans, David Pointcheval |
| 2019 | Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen |
| 2019 | pRate: Anonymous Star Rating with Rating Secrecy. Jia Liu, Mark Manulis |