| 2023 | An Improved BKW Algorithm for Solving LWE with Small Secrets. Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu |
| 2023 | Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. Bingchang He, Atsuko Miyaji |
| 2023 | Certificate Reuse in Android Applications. Fatemeh Nezhadian, Enrico Branca, Natalia Stakhanova |
| 2023 | Dynamic Multi-server Updatable Encryption. Jodie Knapp, Elizabeth A. Quaglia |
| 2023 | Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. Li Duan, Yong Li, Lijun Liao |
| 2023 | Evolving Conditional Disclosure of Secrets. Naty Peter |
| 2023 | Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks. Manel Slokom, Peter-Paul de Wolf, Martha A. Larson |
| 2023 | Fregata: Faster Homomorphic Evaluation of AES via TFHE. Benqiang Wei, Ruida Wang, Zhihao Li, Qinju Liu, Xianhui Lu |
| 2023 | From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions. Valerio Bucci, Wanpeng Li |
| 2023 | Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings. Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu |
| 2023 | Hybrid Group Key Exchange with Application to Constrained Networks. Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord |
| 2023 | Impossible Differential Cryptanalysis of the FBC Block Cipher. Jiqiang Lu, Xiao Zhang |
| 2023 | Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings Elias Athanasopoulos, Bart Mennink |
| 2023 | Libra: Library Identification in Obfuscated Android Apps. David A. Tomassi, Kenechukwu Nwodo, Mohamed Elsabagh |
| 2023 | Load-and-Act: Increasing Page Coverage of Web Applications. Nico Weidmann, Thomas Barber, Christian Wressnegger |
| 2023 | Loss and Likelihood Based Membership Inference of Diffusion Models. Hailong Hu, Jun Pang |
| 2023 | Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. Luke Harmon, Gaetan Delavignette |
| 2023 | On the Privacy-Preserving Infrastructure for Authenticated Key Exchange. Li Duan, Yong Li |
| 2023 | Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt |
| 2023 | Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara |
| 2023 | Privacy-Preserving Medical Data Generation Using Adversarial Learning. Pronaya Prosun Das, Despina Tawadros, Lena Wiese |
| 2023 | Protecting Private Keys of Dilithium Using Hardware Transactional Memory. Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin |
| 2023 | RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing. Wei Chen, Huaijin Wang, Weixi Gu, Shuai Wang |
| 2023 | Robust Property-Preserving Hash Meets Homomorphism. Keyang Liu, Xingxin Li, Tsuyoshi Takagi |
| 2023 | SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection. Songyue Chen, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu |
| 2023 | Symmetry Defense Against CNN Adversarial Perturbation Attacks. Blerta Lindqvist |
| 2023 | TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen |
| 2023 | Trace-and-Revoke Quadratic Functional Encryption. Qiuwei Zheng, Jun Zhao |
| 2023 | VNGuard: Intrusion Detection System for In-Vehicle Networks. Yan Lin Aung, Shanshan Wang, Wang Cheng, Sudipta Chattopadhyay, Jianying Zhou, Anyu Cheng |
| 2023 | Withdrawable Signature: How to Call Off a Signature. Xin Liu, Joonsang Baek, Willy Susilo |