| 2022 | (Commit-and-Prove) Predictable Arguments with Privacy. Hamidreza Khoshakhlagh |
| 2022 | A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert |
| 2022 | A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala |
| 2022 | A White-Box Speck Implementation Using Self-equivalence Encodings. Joachim Vandersmissen, Adrián Ranea, Bart Preneel |
| 2022 | An Approach to Generate Realistic HTTP Parameters for Application Layer Deception. Merve Sahin, Cédric Hébert, Rocío Cabrera Lozoya |
| 2022 | An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang |
| 2022 | Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu |
| 2022 | Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings Giuseppe Ateniese, Daniele Venturi |
| 2022 | Astrape: Anonymous Payment Channels with Boring Cryptography. Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba |
| 2022 | Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges. Hosein Hadipour, Maria Eichlseder |
| 2022 | Babel Fees via Limited Liabilities. Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova |
| 2022 | Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. Prakash Shrestha, Nitesh Saxena |
| 2022 | Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux |
| 2022 | Carry-Less to BIKE Faster. Ming-Shing Chen, Tim Güneysu, Markus Krausz, Jan Philipp Thoma |
| 2022 | Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities. Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux |
| 2022 | Covert Authentication from Lattices. Rajendra Kumar, Khoa Nguyen |
| 2022 | Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek |
| 2022 | Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow |
| 2022 | Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp |
| 2022 | Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura |
| 2022 | Efficient Two-Party Exponentiation from Quotient Transfer. Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka |
| 2022 | Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security. Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee |
| 2022 | FAST: Fair Auctions via Secret Transactions. Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh |
| 2022 | Faster Kyber and Dilithium on the Cortex-M4. Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels |
| 2022 | Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. Zengrui Liu, Prakash Shrestha, Nitesh Saxena |
| 2022 | How Byzantine is a Send Corruption? Karim Eldefrawy, Julian Loss, Ben Terner |
| 2022 | IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun |
| 2022 | Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter |
| 2022 | Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64. Feifan Wang, Gaoli Wang |
| 2022 | Improving the Privacy of Tor Onion Services. Edward Eaton, Sajin Sasy, Ian Goldberg |
| 2022 | KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip. Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers |
| 2022 | Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. Shingo Sato, Keita Emura, Atsushi Takayasu |
| 2022 | PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim |
| 2022 | Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter |
| 2022 | Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad |
| 2022 | Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators. Florette Martinez |
| 2022 | Privacy-Preserving Authenticated Key Exchange for Constrained Devices. Loïc Ferreira |
| 2022 | Probing for Passwords - Privacy Implications of SSIDs in Probe Requests. Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath |
| 2022 | Progressive and Efficient Verification for Digital Signatures. Cecilia Boschini, Dario Fiore, Elena Pagnin |
| 2022 | Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices. Gustavo Banegas, Koen Zandberg, Emmanuel Baccelli, Adrian Herrmann, Benjamin Smith |
| 2022 | RSA Key Recovery from Digit Equivalence Information. Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom |
| 2022 | Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. Alisa Pankova, Jan Willemson |
| 2022 | Revocable Hierarchical Attribute-Based Signatures from Lattices. Daniel Gardham, Mark Manulis |
| 2022 | Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy. S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu |
| 2022 | ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes. Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan |