| 2022 | (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard. Anaïs Barthoulot, Olivier Blazy, Sébastien Canard |
| 2022 | ACDC: Anonymous Crowdsourcing Using Digital Cash. Luis Adan Saavedra, Alastair R. Beresford |
| 2022 | Analyzing Price Deviations in DeFi Oracles. Ankit Gangwal, Rahul Valluri, Mauro Conti |
| 2022 | Anonymous Random Allocation and Its Applications. Azam Soleimanian |
| 2022 | Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. Kwan Yin Chan, Tsz Hon Yuen |
| 2022 | Auditable Asymmetric Password Authenticated Public Key Establishment. Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong |
| 2022 | Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. Didier Alquié, Guy Chassé, Abderrahmane Nitaj |
| 2022 | Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings Alastair R. Beresford, Arpita Patra, Emanuele Bellini |
| 2022 | Efficient NIZK Arguments with Straight-Line Simulation and Extraction. Michele Ciampi, Ivan Visconti |
| 2022 | Efficient Proofs of Retrievability Using Expander Codes. Françoise Levy-dit-Vehel, Maxime Roméas |
| 2022 | How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. Lukasz Krzywiecki, Hannes Salin |
| 2022 | HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments. Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas |
| 2022 | Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. Sebastian Neef, Nils Wisiol |
| 2022 | Passive Triangulation Attack on ORide. Shyam Murthy, Srinivas Vivek |
| 2022 | Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era. Frederico Schardong, Alexandre Augusto Giron, Fernanda Larisa Müller, Ricardo Custódio |
| 2022 | Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters. Kalikinkar Mandal |
| 2022 | Provable Security of rmHADES Structure. Yuan Gao, Chun Guo |
| 2022 | Redacting Blockchain Without Exposing Chameleon Hash Collisions. Thiago Leucz Astrizi, Ricardo Custódio |
| 2022 | The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN. Dongdong Lin, Shaozhen Chen, ManMan Li, Zezhou Hou |
| 2022 | Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU 's. Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas |
| 2022 | Updatable NIZKs from Non-Interactive Zaps. Karim Baghery, Navid Ghaedi Bardeh |