| 2020 | A Secure Algorithm for Rounded Gaussian Sampling. Séamus Brannigan, Máire O'Neill, Ayesha Khalid, Ciara Rafferty |
| 2020 | Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs. Gyana Sahu, Kurt Rohloff |
| 2020 | An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes. Daniel Kales, Greg Zaverucha |
| 2020 | Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese |
| 2020 | Assembly or Optimized C for Lightweight Cryptography on RISC-V? Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoît Viguier |
| 2020 | Attack on LAC Key Exchange in Misuse Situation. Aurélien Greuet, Simon Montoya, Guénaël Renault |
| 2020 | Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE. Tapas Pal, Ratna Dutta |
| 2020 | Compact Multi-Party Confidential Transactions. Jayamine Alupotha, Xavier Boyen, Ernest Foo |
| 2020 | Cross-Site Search Attacks: Unauthorized Queries over Private Data. Bar Meyuhas, Nethanel Gelernter, Amir Herzberg |
| 2020 | Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings Stephan Krenn, Haya Schulmann, Serge Vaudenay |
| 2020 | Curves with Fast Computations in the First Pairing Group. Rémi Clarisse, Sylvain Duquesne, Olivier Sanders |
| 2020 | Detecting Covert Cryptomining Using HPC. Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti |
| 2020 | Detecting Word Based DGA Domains Using Ensemble Models. P. V. Sai Charan, Sandeep K. Shukla, P. Mohan Anand |
| 2020 | Distance-Bounding, Privacy-Preserving Attribute-Based Credentials. Daniel Bosk, Simon Bouget, Sonja Buchegger |
| 2020 | Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model. Bernardo David, Rafael Dowsley |
| 2020 | Energy Analysis of Lightweight AEAD Circuits. Andrea Caforio, Fatih Balli, Subhadeep Banik |
| 2020 | Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric. Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Víctor Mateu |
| 2020 | Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. Fynn Dallmeier, Jan Peter Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf |
| 2020 | HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security. Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld |
| 2020 | Integral Cryptanalysis of Reduced-Round Tweakable TWINE. Muhammad ElSheikh, Amr M. Youssef |
| 2020 | Lightweight Virtual Payment Channels. Maxim Jourenko, Mario Larangeira, Keisuke Tanaka |
| 2020 | Linear Complexity Private Set Intersection for Secure Two-Party Protocols. Ferhat Karakoç, Alptekin Küpçü |
| 2020 | Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition. Youssef El Housni, Aurore Guillevic |
| 2020 | Provably Secure Scalable Distributed Authentication for Clouds. Andrea Huszti, Norbert Oláh |
| 2020 | Revisiting ECM on GPUs. Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu |
| 2020 | RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation. Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel |
| 2020 | STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments. Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep K. Shukla |
| 2020 | Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT. Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart |
| 2020 | Simulation Extractable Versions of Groth's zk-SNARK Revisited. Karim Baghery, Zaira Pindado, Carla Ràfols |
| 2020 | Stronger Targeted Poisoning Attacks Against Malware Detection. Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto |
| 2020 | Trenchcoat: Human-Computable Hashing Algorithms for Password Generation. Ruthu Hulikal Rooparaghunath, T. S. Harikrishnan, Debayan Gupta |