| 2023 | A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. Razvan Rosie |
| 2023 | A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets. Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu |
| 2023 | A Practical Forward-Secure DualRing. Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen |
| 2023 | Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE. Yoshinori Aono, Junji Shikata |
| 2023 | Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners. Torsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman |
| 2023 | CTA: Confidential Transactions Protocol with State Accumulator. Shumin Si, Puwen Wei, Xiuhan Lin, Li Liu |
| 2023 | Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys. Surbhi Shaw, Ratna Dutta |
| 2023 | Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann |
| 2023 | Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives. Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti |
| 2023 | Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. Anaïs Barthoulot, Olivier Blazy, Sébastien Canard |
| 2023 | Exploiting Android Browser. Animesh Kar, Natalia Stakhanova |
| 2023 | Forward Security Under Leakage Resilience, Revisited. Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan |
| 2023 | Free-XOR in Card-Based Garbled Circuits. Yoshifumi Manabe, Kazumasa Shinagawa |
| 2023 | Hardness of Learning AES with Gradient-Based Methods. Kanat Alimanov, Zhenisbek Assylbekov |
| 2023 | Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. John Preuß Mattsson |
| 2023 | How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium. Timo Glaser, Alexander May |
| 2023 | Improving Privacy of Anonymous Proof-of-Stake Protocols. Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan |
| 2023 | Key Filtering in Cube Attacks from the Implementation Aspect. Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao |
| 2023 | Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties. Hideaki Miyaji, Atsuko Miyaji |
| 2023 | Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing. Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini |
| 2023 | LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness. Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha |
| 2023 | New Techniques for Modeling SBoxes: An MILP Approach. Debranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury |
| 2023 | Privacy-Preserving Digital Vaccine Passport. Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu |
| 2023 | Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. Yuqing Zhao, Chun Guo, Weijia Wang |
| 2023 | Traceable Policy-Based Signatures with Delegation. Ismail Afia, Riham AlTawy |
| 2023 | Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols. Takuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, Takaaki Mizuki |