default search action
36th CSF 2023: Dubrovnik, Croatia
- 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023. IEEE 2023, ISBN 979-8-3503-2192-0
- Denis Firsov, Dominique Unruh:
Zero-Knowledge in EasyCrypt. 1-16 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Statement-Oblivious Threshold Witness Encryption. 17-32 - Zahra Javar, Bruce M. Kapron:
Preimage Awareness in Linicrypt. 33-42 - Vincent Cheval, Véronique Cortier, Alexandre Debant:
Election Verifiability with ProVerif. 43-58 - Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability in Receipt-Free Voting Protocols. 59-74 - David Baelde, Alexandre Debant, Stéphanie Delaune:
Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes. 75-90 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:
Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults. 91-106 - Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei:
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. 107-122 - Yunxiao Zhang, Pasquale Malacaria:
Keep Spending: Beyond Optimal Cyber-Security Investment. 123-136 - Chris Brzuska, Sabine Oechsner:
A State-Separating Proof for Yao's Garbling Scheme. 137-152 - Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia:
On the Incoercibility of Digital Signatures. 153-168 - Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia:
SoK: Delay-Based Cryptography. 169-183 - Vincent Cheval, Itsaka Rakotonirina:
Indistinguishability Beyond Diff-Equivalence in ProVerif. 184-199 - Cas Cremers, Charlie Jacomme, Philip Lukert:
Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis. 200-213 - Johannes Wilson, Mikael Asplund, Niklas Johansson:
Extending the Authentication Hierarchy with One-Way Agreement. 214-228 - Aikaterini-Panagiota Stouka, Thomas Zacharias:
On the (De) centralization of FruitChains. 229-244 - Sebastian Holler, Sebastian Biewer, Clara Schneidewind:
HoRStify: Sound Security Analysis of Smart Contracts. 245-260 - Eric Chan, Marek Chrobak, Mohsen Lesani:
Cross-Chain Swaps with Preferences. 261-275 - Norine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia J. Tillman:
Smart Contract Synthesis Modulo Hyperproperties. 276-291 - Jeppe Fredsgaard Blaabjerg, Aslan Askarov:
OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads. 292-307 - Marco Patrignani, Sam Blackshear:
Robust Safety for Move. 308-323 - Farzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia:
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers. 324-339 - Rodothea-Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos:
Securing Optimized Code Against Power Side Channels. 340-355 - Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach:
Formalizing Stack Safety as a Security Property. 356-371 - Matthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu:
A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity. 372-387 - Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso:
Bayes Security: A Not So Average Metric. 388-406 - Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information. 407-422 - Mireya Jurado, Ramon G. Gonze, Mário S. Alvim, Catuscia Palamidessi:
Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow. 423-438 - Sayanton V. Dibbo:
SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap. 439-456 - Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa:
From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies. 457-472 - Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. 473-488 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE. 489-504 - Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. 505-520 - Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes:
General-Purpose Secure Conflict-free Replicated Data Types. 521-536 - Emiel Lanckriet, Matteo Busi, Dominique Devriese:
$\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote Attestation. 537-551 - Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters:
High-Assurance Field Inversion for Curve-Based Cryptography. 552-567 - Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-Based Anonymous Systems. 568-583 - Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate:
Collusion-Deterrent Threshold Information Escrow. 584-599
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.