ISC C

30 papers

YearTitle / Authors
2023An Improved BKW Algorithm for Solving LWE with Small Secrets.
Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu
2023Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning.
Bingchang He, Atsuko Miyaji
2023Certificate Reuse in Android Applications.
Fatemeh Nezhadian, Enrico Branca, Natalia Stakhanova
2023Dynamic Multi-server Updatable Encryption.
Jodie Knapp, Elizabeth A. Quaglia
2023Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.
Li Duan, Yong Li, Lijun Liao
2023Evolving Conditional Disclosure of Secrets.
Naty Peter
2023Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks.
Manel Slokom, Peter-Paul de Wolf, Martha A. Larson
2023Fregata: Faster Homomorphic Evaluation of AES via TFHE.
Benqiang Wei, Ruida Wang, Zhihao Li, Qinju Liu, Xianhui Lu
2023From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions.
Valerio Bucci, Wanpeng Li
2023Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.
Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu
2023Hybrid Group Key Exchange with Application to Constrained Networks.
Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord
2023Impossible Differential Cryptanalysis of the FBC Block Cipher.
Jiqiang Lu, Xiao Zhang
2023Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings
Elias Athanasopoulos, Bart Mennink
2023Libra: Library Identification in Obfuscated Android Apps.
David A. Tomassi, Kenechukwu Nwodo, Mohamed Elsabagh
2023Load-and-Act: Increasing Page Coverage of Web Applications.
Nico Weidmann, Thomas Barber, Christian Wressnegger
2023Loss and Likelihood Based Membership Inference of Diffusion Models.
Hailong Hu, Jun Pang
2023Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals.
Luke Harmon, Gaetan Delavignette
2023On the Privacy-Preserving Infrastructure for Authenticated Key Exchange.
Li Duan, Yong Li
2023Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics.
Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt
2023Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size.
Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2023Privacy-Preserving Medical Data Generation Using Adversarial Learning.
Pronaya Prosun Das, Despina Tawadros, Lena Wiese
2023Protecting Private Keys of Dilithium Using Hardware Transactional Memory.
Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin
2023RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing.
Wei Chen, Huaijin Wang, Weixi Gu, Shuai Wang
2023Robust Property-Preserving Hash Meets Homomorphism.
Keyang Liu, Xingxin Li, Tsuyoshi Takagi
2023SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection.
Songyue Chen, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu
2023Symmetry Defense Against CNN Adversarial Perturbation Attacks.
Blerta Lindqvist
2023TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments.
Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen
2023Trace-and-Revoke Quadratic Functional Encryption.
Qiuwei Zheng, Jun Zhao
2023VNGuard: Intrusion Detection System for In-Vehicle Networks.
Yan Lin Aung, Shanshan Wang, Wang Cheng, Sudipta Chattopadhyay, Jianying Zhou, Anyu Cheng
2023Withdrawable Signature: How to Call Off a Signature.
Xin Liu, Joonsang Baek, Willy Susilo