Cycle2 accepted papers

Visibility-Aware GHOST: Mitigating Visibility Asymmetry in Subtree-Based Proof-of-Work Consensus

Abdulwahab Almusailem (Kuwait University), Othman Alenezi (Kuwait University), Ameer Mohammed (Kuwait University)

Efficient Sum-Check for High-Degree Polynomials

Yu Wang (Shandong University), Yuncong Zhang (Shandong University), Yu Chen (Shandong University)

Efficient Aggregate Anonymous Credentials for Decentralized Identity

Elli Androulaki (IBM Research Zurich), Angelo De Caro (IBM Research Zurich), Kaoutar Elkhiyaoui (IBM Research Zurich), Rebekah Mercer (IBM Research Zurich / ETH Zürich)

Automatic Teller Machines for Offline Ecash

Anrin Chakraborti (University of Illinois at Chicago), Qingzhao Zhang (University of Arizona), Jingjia Peng (University of Michigan-Ann Arbor), Morley Mao (University of Michigan), Michael K. Reiter (Duke University)

Towards More Efficient Registration-Based Encryption from LWE

Toi Tomita (Organization for the Promotion of Education/Institute of Advanced Sciences, Yokohama National University)

Fully Encrypted Machine Learning Training Using Function-Hiding Functional Encryption

Linda Scheu-Hachtel (University of Mannheim, Germany),
Jasmin Zalonis (University of Mannheim),

Sovereign Modal Signatures

Yingfei Yan (Xidian University), Khai Hanh Tang (Nanyang Technological University), Hien Chu (TU Wien), Sherman S. M. Chow (The Chinese University of Hong Kong), San Ling (Nanyang Technological University), Huaxiong Wang (Nanyang Technological University), Kai Zhang (Shaanxi Normal University)

NEPAL: Climbing Beyond the Limits of Graph Matching Attacks in Privacy-Preserving Record Linkage

Marcel Mildenberger (University of Mannheim, Germany), Jochen Schäfer (University of Mannheim, Germany), Frederik Armknecht (University of Mannheim, Germany)

Photons Are Perfect, Protocols Are Not: Cracking QKD BBM92 via The Internet

Kashyap Thimmaraju (TU Berlin), Max Hiort (TU Berlin), Darshit Suratwala (TU Berlin), Elham Amini (TU Berlin), Jean-Pierre Seifert (TU Berlin)

Adaptive Randomized Smoothing with Certified Robustness for Mitigating Tabular Adversarial Attacks

Nour Alhussien (University at Albany), Bradley Boswell (Augusta University), Gagan Agrawal (University of Georgia), Ahmed Aleroud (Augusta University), Gokila Dorai (Augusta University)

Dynamic Puncturable Encryption

Priyanka Dutta (University of Wollongong), Willy Susilo (University of Wollongong), Fuchun Guo (University of Wollongong), Dung Hoang Duong (University of Wollongong)

FivGeeFuzz: Authorization-Aware API Fuzzing of 5G Core Service-Based Interfaces

Anqi Chen (Northeastern University), Riccardo Preatoni (University of Padova), Brighente Alessandro (University of Padova), Mauro Conti (University of Padua & Örebro University), Cristina Nita-Rotaru (Northeastern University)

A Theoretical Framework for the Security of Multi-Stage LLM Output Filtering Pipelines

Zhenhang Shang (The Hong Kong University of Science and Technology), Haoyu Liu (The Hong Kong University of Science and Technology)

Practical Subvector Commitments with Optimal Opening Complexity

Matteo Campanelli (Offchain Labs and University of Tartu)

High-Throughput Side-Channel-Protected Stream Cipher Hardware for 6G Systems

Yuluan Cao (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University), Cankun Zhao (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University), Bohan Yang (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University), Wenping Zhu (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University), Hanning Wang (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University), Min Zhu (Wuxi Micro Innovation Integrated Circuit Design Co., Ltd., Jiangsu Wuxi, China), Leibo Liu (Beijing National Research Center for lnformation Science and Technology, School of Integrated Circuits, Tsinghua University; State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University)

Amit Jana (IIT Kharagpur), Smita Das (IIT, Kharagpur), Ayantika Chatterjee (IIT Kharagpur), Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur), Yu Sasaki (NTT Social Informatics Laboratories, NIST Associate)

Practical Zero-Trust Threshold Signatures in Large-Scale Asynchronous Networks

Offir Friedman (dwallet labs), Avichai Marmor (dwallet labs), Dolev Mutzari (dWallet Labs), Yehonatan C. Scaly (dwallet labs), Yuval Spiizer (The Hebrew University of Jerusalem)

RLND: A ResNet and LSTM based neural distinguisher for lightweight block ciphers

Jie Liu (Northwestern Polytechnical University, China), Junjie Xu (Northwestern Polytechnical University, China), Yunhao Qiu (Northwestern Polytechnical University, China), Qibo Liu (Northwestern Polytechnical University, China)

OverHear: Headphone based Multi-sensor Keystroke Inference

Raveen Wijewickrama (University of Texas at San Antonio), Maryam Abbasihafshejani (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza Jadliwala (University of Texas at San Antonio)

The Cryptographic Layer of Biometric Authentication

Keng-Yu Chen (EPFL), Serge Vaudenay (EPFL)

(Re-)Formalization and Construction of Reusable and Robust Threshold Fuzzy Extractors

Keisuke Hara (National Institute of Advanced Industrial Science and Technology (AIST)), Keitaro Hashimoto (National Institute of Advanced Industrial Science and Technology (AIST)), Takahiro Matsuda (National Institute of Advanced Industrial Science and Technology (AIST)), Wataru Nakamura (Hitachi, Ltd.), Kenta Takahashi (Hitachi, Ltd.)

BI-ORAM: an oblivious bulk-insertion log table

Zhiqiang Wu (Changsha University of Science & Technology), Jun Liu (Changsha University of Science & Technology)

ICSBoM: Uncovering Hidden Supply Chain Vulnerabilities in ICS Firmware

Yongyu Xie (Georgia Institute of Technology), Daniel Khoshkhoo (Georgia Institute of Technology), Hithem Lamri (NYU Abu Dhabi), Constantine Doumanidis (NYU Abu Dhabi), Brian Davidson (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Ryan Pickren(Georgia Institute of Technology), Raheem Beyah (Georgia Institute of Technology), Katherine Davis (Texas A&M University), Mihalis Maniatakos (NYU Abu Dhabi), Saman Zonouz (Georgia Institute of Technology)

Updatable Private Set Intersection and Beyond: Efficient Constructions via Circuit PSI

Ferran Alborch (EURECOM), Antonio Faonio (EURECOM), Ferhat Karakoç (Ericsson Research), Alptekin Küpçü (Koç University), Camille Malek (EURECOM), Melek Önen (EURECOM), Alexandre Fontaine (EURECOM), Camille Malek (EURECOM), Ferhat Karakoç (Ericsson Research), Tom Chauvier (EURECOM)

Updatable Private Set Intersection and Beyond: Efficient Constructions via Circuit PSI

Ferran Alborch (EURECOM), Antonio Faonio (EURECOM), Ferhat Karakoç (Ericsson Research), Alptekin Küpçü (Koç University), Camille Malek (EURECOM), Melek Önen (EURECOM), Alexandre Fontaine (EURECOM), Camille Malek (EURECOM), Ferhat Karakoç (Ericsson Research), Tom Chauvier (EURECOM)

Round-Optimal Privacy Preserving Authenticated Key Exchange Even for Incomplete Sessions

Xavier Bultel (INSA CVL), Khourédia Cisse (INSA CVL)

PPMLAuth: Privacy-Preserving and Tamper-Resistant Behavioral Authentication

David Monschein (Karlsruhe University of Applied Sciences), Alexander Niedermayer (Karlsruhe University of Applied Sciences), Oliver Waldhorst (Karlsruhe University of Applied Sciences)

A Post Quantum Vector Commitment Scheme with Efficient Insertions and Deletions

Vir Pathak (Stony Brook University), Sushmita Ruj (UNSW, Sydney)

Crypto-Asset Collateralised Loans in Open Finance via Robust Fully Homomorphic Encryption

Lorenzo Martinico (University of Edinburgh), Raffaella Calabrese (University of Edinburgh), Tzameret Rubin (Oxford Brookes), Michele Ciampi (University of Edinburgh)

(Partially) Blind Signatures from Cryptographic Group Actions

Dung Duong (University of Wollongong), Xuan Thanh Khuc (University of Wollongong), Youming Qiao (University of New South Wales), Willy Susilo (University of Wollongong), Chuanqi Zhang (University of Technology Sydney), Youming Qiao (University of Technology Sydney)

The Cost of Fluidity: Communication Complexity Trade-offs in Fluid MPC

Shancheng Zhang (Beihang University), Zongyang Zhang (Beihang University), Bernardo Magri (The University of Manchester), Shancheng Zhang (Beihang University)

Understanding the Robustness of BERT Models Against Hardware Errors: An Experimental Study

Ruixuan Wang (Villanova University), Dongning Ma (Mohamed bin Zayed University of Artificial Intelligence), Xun Jiao (Villanova University)

Adversarial DNS Exfiltration: Framework and Defense Evaluation

Cooper Morgan (Western Washington University), Logan Day (Western Washington University), Filip Jagodzinski (Western Washington University), Hsiang - Jen Hong (Western Washington University)