| 2020 | A Blockchain Traceable Scheme with Oversight Function. Tianjun Ma, Haixia Xu, Peili Li |
| 2020 | A Compact Digital Signature Scheme Based on the Module-LWR Problem. Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi |
| 2020 | A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang |
| 2020 | A Family of Subfield Hyperelliptic Curves for Use in Cryptography. Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta |
| 2020 | A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. Sebastian Renner, Enrico Pozzobon, Jürgen Mottok |
| 2020 | A Love Affair Between Bias Amplifiers and Broken Noise Sources. George Teseleanu |
| 2020 | A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu |
| 2020 | A New General Method of Searching for Cubes in Cube Attacks. Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan |
| 2020 | A Symbolic Model for Systematically Analyzing TEE-Based Protocols. Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang |
| 2020 | A Variational Generative Network Based Network Threat Situation Assessment. Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang |
| 2020 | Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli |
| 2020 | Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. Kaiming Chen, Jiageng Chen |
| 2020 | Attacks on Integer-RLWE. Alessandro Budroni, Benjamin Chetioui, Ermes Franch |
| 2020 | Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley |
| 2020 | Blind Functional Encryption. Sébastien Canard, Adel Hamdi, Fabien Laguillaumie |
| 2020 | Client-Oblivious OPRAM. Gareth T. Davies, Christian Janson, Daniel P. Martin |
| 2020 | CoinBot: A Covert Botnet in the Cryptocurrency Network. Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang |
| 2020 | Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss |
| 2020 | Experimental Comparisons of Verifiable Delay Functions. Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang |
| 2020 | HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator. Luis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh |
| 2020 | Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou |
| 2020 | Information-Theoretic Security of Cryptographic Channels. Marc Fischlin, Felix Günther, Philipp Muth |
| 2020 | Lattice HIBE with Faster Trapdoor Delegation and Applications. Guofeng Tang, Tian Qiu |
| 2020 | Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu |
| 2020 | Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly |
| 2020 | New Practical Public-Key Deniable Encryption. Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen |
| 2020 | One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti |
| 2020 | PiDicators: An Efficient Artifact to Detect Various VMs. Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia |
| 2020 | Profile Matching Across Online Social Networks. Anisa Halimi, Erman Ayday |
| 2020 | Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen |
| 2020 | The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. Georg Maringer, Tim Fritzmann, Johanna Sepúlveda |
| 2020 | Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic Encryption. Martin Zuber, Sergiu Carpov, Renaud Sirdey |
| 2020 | Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity. Hector B. Hougaard, Atsuko Miyaji |
| 2020 | rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices. Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni |