diff --git a/abbrev.bibyml b/abbrev.bibyml index 73081f2..68162b8 100644 --- a/abbrev.bibyml +++ b/abbrev.bibyml @@ -2435,20 +2435,20 @@ asiacrypt: name6: asiacryptname # "~2025, Part~VI" name7: asiacryptname # "~2025, Part~VII" name8: asiacryptname # "~2025, Part~VIII" - ed: "" - vol1: "" - vol2: "" - vol3: "" - vol4: "" - vol5: "" - vol6: "" - vol7: "" - vol8: "" + ed: "Goichiro Hanaoka and Bo-Yin Yang" + vol1: "16245" + vol2: "16246" + vol3: "16247" + vol4: "16248" + vol5: "16249" + vol6: "16250" + vol7: "16251" + vol8: "16252" addr: - @0: "" + @0: "Melbourne, VIC, Australia" @1: "" month: - @0: dec # "~7--11," + @0: dec # "~8--12," @1: dec pub: springer_singapore cansname: @@ -2747,14 +2747,14 @@ cans: name: @0: "CANS 25: 24th " # cansname @2: "CANS 25" # cansname - ed: "" - vol: "" + ed: "Yongdae Kim and Atsuko Miyaji and Mehdi Tibouchi" + vol: "16351" addr: - @0: "" + @0: "Osaka, Japan" @1: "" month: - @0: dec - @1: dec + @0: nov # "~17--20," + @1: nov pub: springer_singapore 26: "CANS26" key: "CANS 2026" @@ -4656,9 +4656,11 @@ esorics: -1: "ESORICS25-1" -2: "ESORICS25-2" -3: "ESORICS25-3" + -4: "ESORICS25-4" key1: "ESORICS 2025, Part~I" key2: "ESORICS 2025, Part~II" key3: "ESORICS 2025, Part~III" + key4: "ESORICS 2025, Part~IV" name1: @0: "ESORICS~2025: 30th " # esoricsname # ", Part~I" @2: "ESORICS~2025" # esoricsname # ", Part~I" @@ -4668,15 +4670,19 @@ esorics: name3: @0: "ESORICS~2025: 30th " # esoricsname # ", Part~III" @2: "ESORICS~2025" # esoricsname # ", Part~III" - ed: "" - vol1: "" - vol2: "" - vol3: "" + name4: + @0: "ESORICS~2025: 30th " # esoricsname # ", Part~IV" + @2: "ESORICS~2025" # esoricsname # ", Part~IV" + ed: "Vincent Nicomette and Abdelmalek Benzekri and Nora Boulahia-Cuppens and Jaideep Vaidya" + vol1: "16053" + vol2: "16054" + vol3: "16055" + vol4: "16056" addr: - @0: "" + @0: "Toulouse, France" @1: "" month: - @0: sep + @0: sep # "~22--24," @1: sep pub: springer_cham eurocryptname: @@ -9535,6 +9541,20 @@ indocrypt: @0: dec # "~18--21," @1: dec pub: springer_cham + 25: "INDOCRYPT25" + key: "INDOCRYPT 2025" + name: + @0: indocryptname # "~2025: 26th " # indocryptsuffix + @2: indocryptname # "~2025" # indocryptsuffix + ed: "Ratna Dutta and Luca De Feo and Sugata Gangopadhyay" + vol: "16372" + addr: + @0: "Bhubaneshwar, India" + @1: "" + month: + @0: dec # "~14--17," + @1: dec + pub: springer_cham iscname_v: 1: @0: "International Workshop on Information Security" @@ -9926,6 +9946,20 @@ isc: @0: oct # "~23--25," @1: oct pub: springer_cham + 25: "ISC25" + key: "ISC 2025" + name: + @0: "ISC~2025: 28th " # iscname_v2 + @2: "ISC~2025" # iscname_v2 + ed: "Sang Kil Cha and Jeongeun Park" + vol: "16186" + addr: + @0: "Seoul, South Korea" + @1: "" + month: + @0: oct # "~20--22," + @1: oct + pub: springer_cham itcname: @0: "Conference on Information-Theoretic Cryptography" @2: "" @@ -10485,7 +10519,7 @@ iwsec: @0: aug # "~29--31," @1: aug pub: springer_cham - 24: "IWSEC23" + 24: "IWSEC24" key: "IWSEC 2024" name: @0: "IWSEC 24: 19th " # iwsecname @@ -10499,6 +10533,20 @@ iwsec: @0: sep # "~17--19," @1: sep pub: springer_singapore + 25: "IWSEC25" + key: "IWSEC 2025" + name: + @0: "IWSEC 25: 20th " # iwsecname + @2: "IWSEC 25" # iwsecname + ed: "Carlos Cid and Naoto Yanai" + vol: "16208" + addr: + @0: "Fukuoka, Japan" + @1: "" + month: + @0: nov # "~25--27," + @1: nov + pub: springer_singapore latinname: @0: "Latin American Symposium" @2: "" @@ -14650,9 +14698,11 @@ tcc: -1: "TCC25-1" -2: "TCC25-2" -3: "TCC25-3" + -4: "TCC25-4" key1: "TCC 2025, Part~I" key2: "TCC 2025, Part~II" key3: "TCC 2025, Part~III" + key4: "TCC 2025, Part~IV" name1: @0: "TCC~2025: 23rd " # tccname # ", Part~I" @2: "TCC~2025" # tccname # ", Part~I" @@ -14662,16 +14712,20 @@ tcc: name3: @0: "TCC~2025: 23rd " # tccname # ", Part~III" @2: "TCC~2025" # tccname # ", Part~III" - ed: "" - vol1: "" - vol2: "" - vol3: "" + name4: + @0: "TCC~2025: 23rd " # tccname # ", Part~IV" + @2: "TCC~2025" # tccname # ", Part~IV" + ed: "Benny Applebaum and Huijia (Rachel) Lin" + vol1: "16268" + vol2: "16269" + vol3: "16270" + vol4: "16271" addr: - @0: "" + @0: "Aarhus, Denmark" @1: "" month: - @0: nov - @1: nov + @0: dec # "~1--5," + @1: dec pub: springer_cham tches: @0: "{IACR} Transactions on Cryptographic Hardware and Embedded Systems" @@ -16216,11 +16270,11 @@ csf: @2: "CSF 2025 " # csfname ed: "" addr: - @0: "" + @0: "Santa Cruz, CA, USA" @1: "" month: - @0: jul - @1: "" + @0: jun # "~16--20," + @1: jun 26: "CSF26" key: "CSF 2026" name: diff --git a/changes.txt b/changes.txt index 2ef5e63..54f3018 100644 --- a/changes.txt +++ b/changes.txt @@ -1,3 +1,6 @@ +* 2026-01-25 +AC 2025, CANS 2025, CSF 2025, ESORICS 2025, INDOCRYPT 2025, ISC 2025, IWSEC 2025, TCC 2025 + * 2025-12-12 ASIACCS 2025, ACM CCS 2025, EuroS&P 2025, ICICS 2025, LATINCRYPT 2025, PROVSEC 2025, USENIX Security 2025, DCC 2025 (Numbers 1-11), JC 2025 (Numbers 1-4), JCEng 2025 (Numbers 1-4), PoPETS 2025 (Numbers 1-4), TCHES 2025 (Numbers 1-4), ToSC 2025 (Numbers 1-3) diff --git a/crypto_conf_list.bib b/crypto_conf_list.bib index cfc7049..2349d96 100644 --- a/crypto_conf_list.bib +++ b/crypto_conf_list.bib @@ -5235,6 +5235,19 @@ @Proceedings{ESORICS25-3 year = 2025, } +@Proceedings{ESORICS25-4, + key = esorics25key4, + editor = esorics25ed, + title = esorics25name4, + booktitle = esorics25name4, + volume = esorics25vol4, + month = esorics25month, + address = esorics25addr, + publisher = esorics25pub, + series = mylncs, + year = 2025, +} + @Proceedings{ESORICS24-1, key = esorics24key1, editor = esorics24ed, @@ -10680,17 +10693,18 @@ @Proceedings{IMA95 % INDOCRYPT %------------------------------------------------------------------ -@Proceedings{INDOCRYPT24-2, - key = indocrypt24key2, - editor = indocrypt24ed, - title = indocrypt24name2, - booktitle = indocrypt24name2, - volume = indocrypt24vol2, - month = indocrypt24month, - address = indocrypt24addr, - publisher = indocrypt24pub, + +@Proceedings{INDOCRYPT25, + key = indocrypt25key, + editor = indocrypt25ed, + title = indocrypt25name, + booktitle = indocrypt25name, + volume = indocrypt25vol, + month = indocrypt25month, + address = indocrypt25addr, + publisher = indocrypt25pub, series = mylncs, - year = 2024, + year = 2025, } @Proceedings{INDOCRYPT24-1, @@ -10706,17 +10720,17 @@ @Proceedings{INDOCRYPT24-1 year = 2024, } -@Proceedings{INDOCRYPT23-2, - key = indocrypt23key2, - editor = indocrypt23ed, - title = indocrypt23name2, - booktitle = indocrypt23name2, - volume = indocrypt23vol2, - month = indocrypt23month, - address = indocrypt23addr, - publisher = indocrypt23pub, +@Proceedings{INDOCRYPT24-2, + key = indocrypt24key2, + editor = indocrypt24ed, + title = indocrypt24name2, + booktitle = indocrypt24name2, + volume = indocrypt24vol2, + month = indocrypt24month, + address = indocrypt24addr, + publisher = indocrypt24pub, series = mylncs, - year = 2023, + year = 2024, } @Proceedings{INDOCRYPT23-1, @@ -10732,6 +10746,19 @@ @Proceedings{INDOCRYPT23-1 year = 2023, } +@Proceedings{INDOCRYPT23-2, + key = indocrypt23key2, + editor = indocrypt23ed, + title = indocrypt23name2, + booktitle = indocrypt23name2, + volume = indocrypt23vol2, + month = indocrypt23month, + address = indocrypt23addr, + publisher = indocrypt23pub, + series = mylncs, + year = 2023, +} + @Proceedings{INDOCRYPT22, key = indocrypt22key, editor = indocrypt22ed, @@ -11035,6 +11062,19 @@ @Proceedings{INDOCRYPT00 % ISC %------------------------------------------------------------------ +@Proceedings{ISC25, + key = isc25key, + editor = isc25ed, + title = isc25name, + booktitle = isc25name, + volume = isc25vol, + month = isc25month, + address = isc25addr, + publisher = isc25pub, + series = mylncs, + year = 2025, +} + @Proceedings{ISC24-1, key = isc24key1, editor = isc24ed, @@ -11674,6 +11714,32 @@ @Proceedings{ITCS10 % IWSEC %------------------------------------------------------------------ +@Proceedings{IWSEC25, + key = iwsec25key, + editor = iwsec25ed, + title = iwsec25name, + booktitle = iwsec25name, + volume = iwsec25vol, + month = iwsec25month, + address = iwsec25addr, + publisher = iwsec25pub, + series = mylncs, + year = 2025, +} + +@Proceedings{IWSEC24, + key = iwsec24key, + editor = iwsec24ed, + title = iwsec24name, + booktitle = iwsec24name, + volume = iwsec24vol, + month = iwsec24month, + address = iwsec24addr, + publisher = iwsec24pub, + series = mylncs, + year = 2024, +} + @Proceedings{IWSEC23, key = iwsec23key, editor = iwsec23ed, @@ -15924,6 +15990,19 @@ @Proceedings{TCC25-3 year = 2025, } +@Proceedings{TCC25-4, + key = tcc25key4, + editor = tcc25ed, + title = tcc25name4, + booktitle = tcc25name4, + volume = tcc25vol4, + month = tcc25month, + address = tcc25addr, + publisher = tcc25pub, + series = mylncs, + year = 2025, +} + @Proceedings{TCC24-1, key = tcc24key1, editor = tcc24ed, diff --git a/crypto_db.bib b/crypto_db.bib index c04c0db..53d9439 100644 --- a/crypto_db.bib +++ b/crypto_db.bib @@ -2,23 +2,23 @@ % DO NOT MODIFY MANUALLY -% AC: 1990 - 2024 +% AC: 1990 - 2025 % ACISP: 1996 - 2025 % ACNS: 2003 - 2025 % AFRICACRYPT: 2008 - 2025 % ASIACCS: 2006 - 2025 % C: 1981 - 2025 -% CANS: 2005 - 2024 +% CANS: 2005 - 2025 % CCS: 1993 - 2025 % CHES: 1999 - 2017 % COSADE: 2012 - 2024 % CQRE: 1999 - 1999 -% CSF: 2007 - 2024 +% CSF: 2007 - 2025 % CiC: 2024 - 2025 % DCC: 1991 - 2025 % EC: 1982 - 2025 % EPRINT: 1996 - 2025 -% ESORICS: 1990 - 2024 +% ESORICS: 1990 - 2025 % EUROSP: 2016 - 2025 % FC: 1997 - 2024 % FCW: 2010 - 2024 @@ -29,11 +29,11 @@ % ICISC: 1998 - 2024 % ICITS: 2007 - 2017 % IMA: 1995 - 2023 -% INDOCRYPT: 2000 - 2024 -% ISC: 1997 - 2024 +% INDOCRYPT: 2000 - 2025 +% ISC: 1997 - 2025 % ITC: 2020 - 2025 % ITCS: 2010 - 2025 -% IWSEC: 2006 - 2024 +% IWSEC: 2006 - 2025 % JC: 1988 - 2025 % JCEng: 2011 - 2025 % LATIN: 1992 - 2024 @@ -52,7 +52,7 @@ % SODA: 1991 - 2025 % SP: 1992 - 2025 % STOC: 1980 - 2025 -% TCC: 2004 - 2024 +% TCC: 2004 - 2025 % TCHES: 2018 - 2025 % TRUSTBUS: 2004 - 2022 % ToSC: 2016 - 2025 @@ -82507,6 +82507,1511 @@ @InProceedings{ASIACCS:NevSeiWan06 crossref = asiaccs06, } +@InProceedings{AC:CHMNSS25, + author = "Yu Long Chen and + Yukihito Hiraga and + Nicky Mouha and + Yusuke Naito and + Yu Sasaki and + Takeshi Sugawara", + title = "Beyond-Birthday-Bound Security with {HCTR2}: Cascaded Construction and Tweak-Based Key Derivation", + pages = "3--34", + doi = "10.1007/978-981-95-5018-0_1", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:FloTod25, + author = "Antonio {Fl{\'o}rez-Guti{\'e}rrez} and + Yosuke Todo", + title = "Divide-and-Conquer Trail Enumeration Puncturing: Application to Salsa and {ChaCha}", + pages = "35--65", + doi = "10.1007/978-981-95-5018-0_2", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:BeyVer25, + author = "Tim Beyne and + Michiel Verbauwhede", + title = "Integral Cryptanalysis in Characteristic p", + pages = "66--96", + doi = "10.1007/978-981-95-5018-0_3", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:CanFru25, + author = "Anne Canteaut and + Merlin Fruchon", + title = "Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs", + pages = "97--130", + doi = "10.1007/978-981-95-5018-0_4", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:SidWan25, + author = "Antoine Sidem and + Qingju Wang", + title = "General Key Recovery Attack on Pointwise-Keyed Functions - Application to Alternating Moduli Weak {PRFs}", + pages = "131--154", + doi = "10.1007/978-981-95-5018-0_5", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:CGLSZ25, + author = "Shiyao Chen and + Jian Guo and + Eik List and + Danping Shi and + Tianyu Zhang", + title = "Scrutinizing the Security of {AES}-Based Hashing and One-Way Functions", + pages = "157--188", + doi = "10.1007/978-981-95-5018-0_6", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:BDGBN25, + author = "Christina Boura and + Patrick Derbez and + Baptiste Germon and + Rachelle Heim Boissier and + Mar{\'i}a {Naya-Plasencia}", + title = "{SPEEDY}: Caught at Last", + pages = "189--220", + doi = "10.1007/978-981-95-5018-0_7", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:ZLWHWW25, + author = "Zhuolong Zhang and + Muzhou Li and + Haoyang Wang and + Shiqi Hou and + Wei Wang and + Meiqin Wang", + title = "Improved Semi-Free-Start Collision Attacks on {RIPEMD}-160", + pages = "221--252", + doi = "10.1007/978-981-95-5018-0_8", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:MfoNayNeu25, + author = "Dounia M'foukh and + Mar{\'i}a {Naya-Plasencia} and + Patrick Neumann", + title = "The State-Test Technique on Differential Attacks: a 26-Round Attack on Craft and Other Applications", + pages = "253--284", + doi = "10.1007/978-981-95-5018-0_9", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:ZLMSFW25, + author = "Bin Zhang and + Ruitao Liu and + Willi Meier and + Siwei Sun and + Dengguo Feng and + Wenling Wu", + title = "Vectorial Fast Correlation Attacks", + pages = "285--316", + doi = "10.1007/978-981-95-5018-0_10", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:GWHJH25, + author = "Xinxin Gong and + Qingju Wang and + Yonglin Hao and + Lin Jiao and + Xichao Hu", + title = "Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several {ARX} Ciphers", + pages = "317--351", + doi = "10.1007/978-981-95-5018-0_11", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:CheTia25, + author = "Cheng Che and + Tian Tian", + title = "Enhancing the {DATF} Technique in Differential-Linear Cryptanalysis", + pages = "352--382", + doi = "10.1007/978-981-95-5018-0_12", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:YanZheYan25, + author = "Hong-Sen Yang and + Qun-Xiong Zheng and + Jing Yang", + title = "Algebraic Cryptanalysis of {AO} Primitives Based on Polynomial Decomposition - Applications to Rain and Full {AIM}-{I}/{III}/{V}", + pages = "383--410", + doi = "10.1007/978-981-95-5018-0_13", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:Hosoyamada25, + author = "Akinori Hosoyamada", + title = "Post-Quantum Security of Keyed Sponge-Based Constructions Through a Modular Approach", + pages = "411--445", + doi = "10.1007/978-981-95-5018-0_14", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:BBCJJR25, + author = "Jyotirmoy Basak and + Ritam Bhaumik and + Amit Kumar Chauhan and + Ravindra Jejurikar and + Ashwin Jha and + Anandarup Roy and + Andr{\'e} Schrottenloher and + Suprita Talnikar", + title = "Post-quantum Security of Key-Alternating Feistel Ciphers", + pages = "446--478", + doi = "10.1007/978-981-95-5018-0_15", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:LinVas25, + author = "Haoxing Lin and + Prashant Nalini Vasudevan", + title = "On Wagner's k-Tree Algorithm Over Integers", + pages = "481--513", + doi = "10.1007/978-981-95-5018-0_16", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:GuoNanYao25, + author = "Jian Guo and + Wenjie Nan and + Yiran Yao", + title = "Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems", + pages = "514--545", + doi = "10.1007/978-981-95-5018-0_17", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:CJNNS25, + author = "Beno{\^i}t Cogliati and + Ashwin Jha and + Jordan Remy Reuven Naccache and + Mridul Nandi and + Abishanka Saha", + title = "On the Number of Restricted Solutions to Constrained Systems and Their Applications", + pages = "546--579", + doi = "10.1007/978-981-95-5018-0_18", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:JahMenBat25, + author = "Vahid Jahandideh and + Bart Mennink and + Lejla Batina", + title = "A Decomposition Approach for Evaluating Security of Masking", + pages = "580--612", + doi = "10.1007/978-981-95-5018-0_19", + crossref = asiacrypt25-1, +} + +@InProceedings{AC:NamRis25, + author = "Armin Namavari and + Thomas Ristenpart", + title = "Transcript Franking for Encrypted Messaging", + pages = "3--33", + doi = "10.1007/978-981-95-5096-8_1", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:ADGT25, + author = "Jo{\"e}l Alwen and + Xiaohui Ding and + Sanjam Garg and + Yiannis Tselekounis", + title = "Policy Compliant Secure Messaging", + pages = "34--67", + doi = "10.1007/978-981-95-5096-8_2", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:GJNR25, + author = "Yanqi Gu and + Stanislaw Jarecki and + Phillip Nazarian and + Apurva Rai", + title = "Security Without Trusted Third Parties: {VRF}-Based Authentication with Short Authenticated Strings", + pages = "68--99", + doi = "10.1007/978-981-95-5096-8_3", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:LWCHSY25, + author = "Jiahao Liu and + Yi Wang and + Rongmao Chen and + Xinyi Huang and + Jinshu Su and + Moti Yung", + title = "Universally Composable Subversion-Resilient Authenticated Key Exchange", + pages = "103--136", + doi = "10.1007/978-981-95-5096-8_4", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:DHLMMO25, + author = "Fran{\c c}ois Dupressoir and + Andreas H{\"u}lsing and + Cameron Low and + Matthias Meijers and + Charlotte Mylog and + Sabine Oechsner", + title = "How Hard can it be to Formalize a Proof? - {L}essons from Formalizing {CryptoBox} Three Times in {EasyCrypt}", + pages = "137--167", + doi = "10.1007/978-981-95-5096-8_5", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:AlmBisTir25, + author = "Ghada Almashaqbeh and + Allison Bishop and + Hayder Tirmazi", + title = "Adversary Resilient Learned Bloom Filters", + pages = "171--202", + doi = "10.1007/978-981-95-5096-8_6", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:GKME25, + author = "Marilyn George and + Seny Kamara and + Tarik Moataz and + Zachary Espiritu", + title = "Structured Encryption and Distribution-Aware Leakage Suppression", + pages = "203--237", + doi = "10.1007/978-981-95-5096-8_7", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:GazQuaRus25, + author = "Peter Gazi and + Saad Quader and + Alexander Russell", + title = "Taming Iterative Grinding Attacks on Blockchain Beacons", + pages = "241--272", + doi = "10.1007/978-981-95-5096-8_8", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:CohDasMor25, + author = "Ran Cohen and + Poulami Das and + Tal Moran", + title = "Setup-Free Committee Sampling with Subquadratic Communication", + pages = "273--304", + doi = "10.1007/978-981-95-5096-8_9", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:CiaKiaShe25, + author = "Michele Ciampi and + Aggelos Kiayias and + Yu Shen", + title = "Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security", + pages = "305--337", + doi = "10.1007/978-981-95-5096-8_10", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:ChaUdo25, + author = "Alex Charl{\`e}s and + Aleksei Udovenko", + title = "Haystack Ciphers: White-Box Countermeasures as Symmetric Encryption", + pages = "341--374", + doi = "10.1007/978-981-95-5096-8_11", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:BelNorRiv25, + author = "Sonia Bela{\"i}d and + Victor Normand and + Matthieu Rivain", + title = "Masked Circuit Compiler in the Cardinal Random Probing Composability Framework", + pages = "375--406", + doi = "10.1007/978-981-95-5096-8_12", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:DhoOvcTop25, + author = "Siemen Dhooghe and + Artemii Ovchinnikov and + Dilara Toprakhisar", + title = "{StaMAC}: Fault Protection via Stable-{MAC} Tags", + pages = "407--440", + doi = "10.1007/978-981-95-5096-8_13", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:TGGDZ25, + author = "Yufeng Tang and + Zheng Gong and + Jian Guo and + Xiaoyang Dong and + Liangju Zhao", + title = "Towards Combined Countermeasures against Differential Computation and Fault Analyses: An Approach with the {ASASA} Structure", + pages = "441--474", + doi = "10.1007/978-981-95-5096-8_14", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:LiaLuo25, + author = "Haoyu Liao and + Qingbin Luo", + title = "Quantum Circuit Synthesis for {AES} with Low {DW}-Cost", + pages = "475--507", + doi = "10.1007/978-981-95-5096-8_15", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:GMMZ25, + author = "Jens Groth and + Harjasleen Malvai and + Andrew Miller and + Yi-Nuo Zhang", + title = "Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications", + pages = "511--543", + doi = "10.1007/978-981-95-5096-8_16", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:FMMNOS25, + author = "Sebastian Faust and + Lo{\"i}c Masure and + Elena Michel and + Hai Hoang Nguyen and + Maximilian Orlt and + Fran{\c c}ois-Xavier Standaert", + title = "{IP} Masking with Generic Security Guarantees Under Minimum Assumptions, and Applications", + pages = "544--575", + doi = "10.1007/978-981-95-5096-8_17", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:CDMSWY25, + author = "Yi Chen and + Xiaoyang Dong and + Ruijie Ma and + Yantian Shen and + Anyu Wang and + Hongbo Yu and + Xiaoyun Wang", + title = "Delving into Cryptanalytic Extraction of {PReLU} Neural Networks", + pages = "576--607", + doi = "10.1007/978-981-95-5096-8_18", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:DFMMSS25, + author = "Simon Damm and + Asja Fischer and + Alexander May and + Soundes Marzougui and + Leander Schwarz and + Henning Seidler and + Jean-Pierre Seifert and + Jonas Thietke and + Vincent Quentin Ulitzsch", + title = "Solving Concealed {ILWE} and Its Application for Breaking Masked Dilithium", + pages = "608--640", + doi = "10.1007/978-981-95-5096-8_19", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:KosXag25, + author = "Haruhisa Kosuge and + Keita Xagawa", + title = "The Security of {ML}-{DSA} Against Fault-Injection Attacks", + pages = "641--674", + doi = "10.1007/978-981-95-5096-8_20", + crossref = asiacrypt25-2, +} + +@InProceedings{AC:Genvan25, + author = "Dani{\"e}l M. H. van Gent and + Wessel P. J. {van Woerden}", + title = "A Search to Distinguish Reduction for the Isomorphism Problem on Direct Sum Lattices", + pages = "3--33", + doi = "10.1007/978-981-95-5099-9_1", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:QuXu25, + author = "Hongyuan Qu and + Guangwu Xu", + title = "On the Provable Dual Attack for {LWE} by Modulus Switching", + pages = "34--64", + doi = "10.1007/978-981-95-5099-9_2", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:DucPulSte25, + author = "L{\'e}o Ducas and + Ludo N. Pulles and + Marc Stevens", + title = "Towards a Modern {LLL} Implementation", + pages = "65--99", + doi = "10.1007/978-981-95-5099-9_3", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:KKNM25, + author = "Alexander Karenin and + Elena Kirshanova and + Julian Nowakowski and + Alexander May", + title = "Fast Slicer for Batch-{CVP}: Making Lattice Hybrid Attacks Practical", + pages = "100--132", + doi = "10.1007/978-981-95-5099-9_4", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:DucEngPer25, + author = "L{\'e}o Ducas and + Lynn Engelberts and + Paola de Perthuis", + title = "Predicting Module-Lattice Reduction", + pages = "133--166", + doi = "10.1007/978-981-95-5099-9_5", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:WJLY25, + author = "Zhedong Wang and + Haoxiang Jin and + Feng-Hao Liu and + Yang Yu", + title = "Revisiting the Robustness of ({R}/{M}){LWR} Under Polynomial Moduli with Its Applications", + pages = "167--199", + doi = "10.1007/978-981-95-5099-9_6", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:JeuSan25, + author = "Corentin Jeudy and + Olivier Sanders", + title = "Worst-Case Lattice Sampler with Truncated Gadgets and Applications", + pages = "200--232", + doi = "10.1007/978-981-95-5099-9_7", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:ZJRYYW25, + author = "Shiduo Zhang and + Huiwen Jia and + Delong Ran and + Yang Yu and + Yu Yu and + Xiaoyun Wang", + title = "{GPV} Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures", + pages = "233--264", + doi = "10.1007/978-981-95-5099-9_8", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:ALLW25, + author = "Martin R. Albrecht and + Russell W. F. Lai and + Oleksandra Lapiha and + Ivy K. Y. Woo", + title = "Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally", + pages = "265--296", + doi = "10.1007/978-981-95-5099-9_9", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:KLNO25, + author = "Michael Kloo{\ss} and + Russell W. F. Lai and + Ngoc Khanh Nguyen and + Michal Osadnik", + title = "{RoK} and Roll - Verifier-Efficient Random Projection for {$\tilde{O}(\lambda)$}-Size Lattice Arguments - (Extended Abstract)", + pages = "297--329", + doi = "10.1007/978-981-95-5099-9_10", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:BonChe25, + author = "Dan Boneh and + Binyi Chen", + title = "{LatticeFold}: {A} Lattice-Based Folding Scheme and Its Applications to Succinct Proof Systems", + pages = "330--362", + doi = "10.1007/978-981-95-5099-9_11", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:LiuSak25, + author = "Shuiyin Liu and + Amin Sakzad", + title = "Compact Lattice-Coded (Multi-recipient) Kyber Without {CLT} Independence Assumption", + pages = "363--395", + doi = "10.1007/978-981-95-5099-9_12", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:LZLCY25, + author = "Yijian Liu and + Yu Zhang and + Xianhui Lu and + Yao Cheng and + Yongjian Yin", + title = "{DAWN}: Smaller and Faster {NTRU} Encryption via Double Encoding", + pages = "396--427", + doi = "10.1007/978-981-95-5099-9_13", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:LSTW25, + author = "Zeyu Liu and + Katerina Sotiraki and + Eran Tromer and + Yunhao Wang", + title = "Lattice-Based Multi-message Multi-recipient {KEM}/{PKE} with Malicious Security", + pages = "428--460", + doi = "10.1007/978-981-95-5099-9_14", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:LapPre25, + author = "Oleksandra Lapiha and + Thomas Prest", + title = "A Lattice-Based {IND}-{CCA} Threshold {KEM} from the {BCHK}+ Transform", + pages = "461--494", + doi = "10.1007/978-981-95-5099-9_15", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:JWLG25, + author = "Weidan Ji and + Zhedong Wang and + Lin Lyu and + Dawu Gu", + title = "Revisiting Adaptively Secure {IBE} from Lattices with Smaller Modulus: {A} Conceptually Simple Framework with Low Overhead", + pages = "495--526", + doi = "10.1007/978-981-95-5099-9_16", + crossref = asiacrypt25-3, +} + +@InProceedings{AC:HutJou25, + author = "Janik Huth and + Antoine Joux", + title = "{VOLE}-in-the-Head Signatures from Subfield Bilinear Collisions", + pages = "3--34", + doi = "10.1007/978-981-95-5113-2_1", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:HLMPST25, + author = "Lucjan Hanzlik and + Yi-Fu Lai and + Marzio Mula and + Eugenio Paracucchi and + Daniel Slamanig and + Gang Tang", + title = "Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Group Actions", + pages = "35--69", + doi = "10.1007/978-981-95-5113-2_2", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:TNLPS25, + author = "Nam Tran and + Khoa Nguyen and + Dongxi Liu and + Josef Pieprzyk and + Willy Susilo", + title = "Lattice-Based Group Signatures in the Standard Model, Revisited", + pages = "70--102", + doi = "10.1007/978-981-95-5113-2_3", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:BenFis25, + author = "Barbara Jiabao Benedikt and + Marc Fischlin", + title = "The Order of Hashing in Fiat-Shamir Schemes", + pages = "103--137", + doi = "10.1007/978-981-95-5113-2_4", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:Houben25, + author = "Marc Houben", + title = "Efficient Post-quantum Commutative Group Actions from Orientations of Large Discriminant", + pages = "141--173", + doi = "10.1007/978-981-95-5113-2_5", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:BCEIMS25, + author = "Giacomo Borin and + Maria {Corte-Real Santos} and + Jonathan Komada Eriksen and + Riccardo Invernizzi and + Marzio Mula and + Sina Schaeffler and + Frederik Vercauteren", + title = "{sfQlapoti}: Simple and Efficient Translation of Quaternion Ideals to Isogenies", + pages = "174--205", + doi = "10.1007/978-981-95-5113-2_6", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:JanXu25, + author = "Jake Januzelli and + Jiayu Xu", + title = "A Complete Characterization of One-More Assumptions in the Algebraic Group Model", + pages = "206--238", + doi = "10.1007/978-981-95-5113-2_7", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:WZZWCW25, + author = "Taiyu Wang and + Cong Zhang and + Hong-Sheng Zhou and + Xin Wang and + Pengfei Chen and + Wenli Wang and + Kui Ren and + Chun Chen", + title = "Attention is still what you need: Another Round of Exploring Shoup's {GGM}", + pages = "239--271", + doi = "10.1007/978-981-95-5113-2_8", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:MorSto25, + author = "Tomoki Moriya and + Miha Stopar", + title = "{LIT}-{SiGamal}: An Efficient Isogeny-Based {PKE} Based on a {LIT} Diagram", + pages = "275--306", + doi = "10.1007/978-981-95-5113-2_9", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:LevPed25, + author = "Shai Levin and + Robi Pedersen", + title = "Faster Proofs and {VRFs} from Isogenies", + pages = "307--340", + doi = "10.1007/978-981-95-5113-2_10", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:XLZO25, + author = "Zheng Xu and + Kaizhan Lin and + Chang-An Zhao and + Yi Ouyang", + title = "{SQIsign2D$^2$}: New {SQIsign2D} Variant by Leveraging Power Smooth Isogenies in Dimension One", + pages = "341--371", + doi = "10.1007/978-981-95-5113-2_11", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:Duparc25, + author = "Max Duparc", + title = "Superglue: Fast Formulae for (2,2)-Gluing Isogenies", + pages = "372--400", + doi = "10.1007/978-981-95-5113-2_12", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:FINA25, + author = "Hiroki Furue and + Yasuhiko Ikematsu and + Shuhei Nakamura and + Rika Akiyama", + title = "Improved Cryptanalysis of {SNOVA} by Solving Multi-homogeneous Systems via Matrix Transformations", + pages = "405--435", + doi = "10.1007/978-981-95-5113-2_13", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:BDHV25, + author = "Charles Bouillaguet and + Claire Delaplace and + Micka{\"e}l Hamdad and + Damien Vergnaud", + title = "Practical Cryptanalysis of Pseudorandom Correlation Generators Based on Quasi-abelian Syndrome Decoding", + pages = "436--465", + doi = "10.1007/978-981-95-5113-2_14", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:WWYLYZ25, + author = "Tianrui Wang and + Anyu Wang and + Kang Yang and + Hanlin Liu and + Yu Yu and + Jun Zhang and + Xiaoyun Wang", + title = "A Hybrid Algorithm for the Regular Syndrome Decoding Problem", + pages = "466--497", + doi = "10.1007/978-981-95-5113-2_15", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:BerLanPel25, + author = "Daniel J. Bernstein and + Tanja Lange and + Alex Pellegrini", + title = "Higher-Genus {McEliece}", + pages = "498--531", + doi = "10.1007/978-981-95-5113-2_16", + crossref = asiacrypt25-4, +} + +@InProceedings{AC:AppHeaRen25, + author = "Ananya Appan and + David Heath and + Ling Ren", + title = "Randomized Agreement, Verifiable Secret Sharing and Multi-party Computation in Granular Synchrony", + pages = "3--34", + doi = "10.1007/978-981-95-5116-3_1", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:AHKP25, + author = "Anasuya Acharya and + Carmit Hazay and + Vladimir Kolesnikov and + Manoj Prabhakaran", + title = "Towards Building Efficient {SCALES} Protocols", + pages = "35--67", + doi = "10.1007/978-981-95-5116-3_2", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:EscMasPol25, + author = "Daniel Escudero and + Elisaweta Masserova and + Antigoni Polychroniadou", + title = "Towards Scalable {YOSO} {MPC} via Packed Secret-Sharing", + pages = "68--101", + doi = "10.1007/978-981-95-5116-3_3", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:DavMonSat25, + author = "Bernardo David and + Arup Mondal and + Rahul Satish", + title = "Rumors {MPC}: {GOD} for Dynamic Committees, Low Communication via Constant-Round Chat", + pages = "102--132", + doi = "10.1007/978-981-95-5116-3_4", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:CRSX25, + author = "Michele Ciampi and + Divya Ravi and + Luisa Siniscalchi and + Yu Xia", + title = "Broadcast-Optimal Secure Computation from Black-Box Oblivious Transfer", + pages = "133--162", + doi = "10.1007/978-981-95-5116-3_5", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:FLTY25, + author = "Hanwen Feng and + Zhenliang Lu and + Qiang Tang and + Yuchen Ye", + title = "Optimal Byzantine Agreement in the Presence of Message Drops", + pages = "163--195", + doi = "10.1007/978-981-95-5116-3_6", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:KZWW25, + author = "Pengzhen Ke and + Liang Feng Zhang and + Huaxiong Wang and + Li-Ping Wang", + title = "List-Decodable Byzantine Robust {PIR}: Lower Communication Complexity, Higher Byzantine Tolerance, Smaller List Size", + pages = "196--227", + doi = "10.1007/978-981-95-5116-3_7", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:BDHL25, + author = "Rishabh Bhadauria and + Nico D{\"o}ttling and + Carmit Hazay and + Chuanwei Lin", + title = "Laconic Cryptography with Preprocessing", + pages = "228--261", + doi = "10.1007/978-981-95-5116-3_8", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:BGJP25, + author = "James Bartusek and + Sanjam Garg and + Abhishek Jain and + Guru-Vamsi Policharla", + title = "Laconic {PSI} on Authenticated Inputs and Applications", + pages = "262--293", + doi = "10.1007/978-981-95-5116-3_9", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:BGMP25, + author = "Dung Bui and + Gayathri Garimella and + Peihan Miao and + Van Long Phuoc Pham", + title = "New Framework for Structure-Aware {PSI} From Distributed Function Secret Sharing", + pages = "294--326", + doi = "10.1007/978-981-95-5116-3_10", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:vanPu25, + author = "Aron {van Baarsen} and + Sihang Pu", + title = "Fuzzy Private Set Intersection from {VOLE}", + pages = "327--360", + doi = "10.1007/978-981-95-5116-3_11", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:CCYY25, + author = "Mingshu Cong and + Sherman S. M. Chow and + Siu-Ming Yiu and + Tsz Hon Yuen", + title = "Scalable {zkSNARKs} for Matrix Computations - {A} Generic Framework for Verifiable Deep Learning", + pages = "363--395", + doi = "10.1007/978-981-95-5116-3_12", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:HolSla25, + author = "Thomas den Hollander and + Daniel Slamanig", + title = "A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More", + pages = "396--426", + doi = "10.1007/978-981-95-5116-3_13", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:NaiShaTha25, + author = "Vineet Nair and + Ashish Sharma and + Bhargav Thankey", + title = "{BrakingBase} - {A} Linear Prover, Poly-Logarithmic Verifier, Field Agnostic Polynomial Commitment Scheme", + pages = "427--455", + doi = "10.1007/978-981-95-5116-3_14", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:GanPatSin25, + author = "Chaya Ganesh and + Sikhar Patranabis and + Nitin Singh", + title = "Samaritan: Linear-Time Prover {SNARK} from New Multilinear Polynomial Commitments", + pages = "456--489", + doi = "10.1007/978-981-95-5116-3_15", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:SriZha25, + author = "Sriram Sridhar and + Yi-Nuo Zhang", + title = "{sfFREPack}: Improved {SNARK} Frontend for Highly Repetitive Computations", + pages = "490--520", + doi = "10.1007/978-981-95-5116-3_16", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:Fu25, + author = "Shihui Fu", + title = "Inner-Product Commitments Over Integers With Applications to Succinct Arguments", + pages = "521--553", + doi = "10.1007/978-981-95-5116-3_17", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:CheEliWu25, + author = "Binyi Chen and + Noel Elias and + David J. Wu", + title = "Pairing-Based Batch Arguments for {NP} with a Linear-Size {CRS}", + pages = "554--577", + doi = "10.1007/978-981-95-5116-3_18", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:LXYYZ25, + author = "Zhe Li and + Chaoping Xing and + Yizhou Yao and + Chen Yuan and + Mengmeng Zhou", + title = "Succinct Line-Point Zero-Knowledge Arguments from Homomorphic Secret Sharing", + pages = "578--609", + doi = "10.1007/978-981-95-5116-3_19", + crossref = asiacrypt25-5, +} + +@InProceedings{AC:PalSch25, + author = "Tapas Pal and + Robert Sch{\"a}dlich", + title = "A General Framework for Registered Functional Encryption via User-Specific Pre-constraining", + pages = "3--34", + doi = "10.1007/978-981-95-5119-4_1", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:ZZZGQ25, + author = "Ziqi Zhu and + Jun Zhao and + Kai Zhang and + Junqing Gong and + Haifeng Qian", + title = "When {KGC} Meets Curator: New Paradigm of Registered {ABE} and {FE}", + pages = "35--67", + doi = "10.1007/978-981-95-5119-4_2", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:DatTomVan25, + author = "Pratish Datta and + Junichi Tomida and + Nikhil Vanjani", + title = "Fully Adaptive Decentralized {MA}-{ABE}: Simplified, Optimized, {ASP} Supported", + pages = "68--105", + doi = "10.1007/978-981-95-5119-4_3", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BolCheHus25, + author = "Alexandra Boldyreva and + Kaishuo Cheng and + Jehad Hussein", + title = "Format-Preserving Compression-Tolerating Authenticated Encryption for Images", + pages = "106--138", + doi = "10.1007/978-981-95-5119-4_4", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:ZHLH25, + author = "Yunxiao Zhou and + Shuai Han and + Shengli Liu and + Xinyi Huang", + title = "Fine-Grained Re-encryptions Between Different Encryption Systems", + pages = "139--173", + doi = "10.1007/978-981-95-5119-4_5", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:LCBAWQ25, + author = "Yunhao Ling and + Jie Chen and + Zijian Bao and + Man Ho Au and + Luping Wang and + Haifeng Qian", + title = "Tightly, Adaptively Secure Proxy Re-encryption in Multi-challenge Setting", + pages = "174--204", + doi = "10.1007/978-981-95-5119-4_6", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BaeGerSch25, + author = "Ruben Baecker and + Paul Gerhart and + Dominique Schr{\"o}der", + title = "Password-Hardened Encryption Revisited", + pages = "205--234", + doi = "10.1007/978-981-95-5119-4_7", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:ABGGKR25, + author = "Behzad Abdolmaleki and + Ruben Baecker and + Paul Gerhart and + Mike Graf and + Mojtaba Khalili and + Daniel Rausch and + Dominique Schr{\"o}der", + title = "Universally Composable Password-Hardened Encryption", + pages = "235--267", + doi = "10.1007/978-981-95-5119-4_8", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:HohWatWu25, + author = "Susan Hohenberger and + Brent Waters and + David J. Wu", + title = "Pairing-Based Aggregate Signatures Without Random Oracles", + pages = "271--303", + doi = "10.1007/978-981-95-5119-4_9", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:Sakai25, + author = "Yusuke Sakai", + title = "Aggregate Signatures Tightly Secure Under Adaptive Corruptions", + pages = "304--336", + doi = "10.1007/978-981-95-5119-4_10", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BHKR25, + author = "Nicholas Brandt and + Dennis Hofheinz and + Michael Kloo{\ss} and + Michael Reichle", + title = "Tightly-Secure Blind Signatures in Pairing-Free Groups", + pages = "337--369", + doi = "10.1007/978-981-95-5119-4_11", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:DeoLib25, + author = "Amit Deo and + Beno{\^i}t Libert", + title = "Anamorphic Signatures With Dictator and Recipient Unforgeability for Long Messages", + pages = "370--401", + doi = "10.1007/978-981-95-5119-4_12", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:ChaTes25, + author = "Rutchathon Chairattana-Apirom and + Stefano Tessaro", + title = "On the Concrete Security of {BBS}/{BBS}+ Signatures", + pages = "402--434", + doi = "10.1007/978-981-95-5119-4_13", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:CDLT25, + author = "Rutchathon Chairattana-Apirom and + Nico D{\"o}ttling and + Anna Lysyanskaya and + Stefano Tessaro", + title = "Everlasting Anonymous Rate-Limited Tokens", + pages = "435--468", + doi = "10.1007/978-981-95-5119-4_14", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BorHofOth25, + author = "Jan Bormet and + Jonas Hofmann and + Hussien Othman", + title = "Traceable Threshold Encryption Without a Trusted Dealer", + pages = "471--505", + doi = "10.1007/978-981-95-5119-4_15", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BBNRS25, + author = "Dan Boneh and + Benedikt B{\"u}nz and + Kartik Nayak and + Lior Rotem and + Victor Shoup", + title = "Context-Dependent Threshold Decryption and Its Applications", + pages = "506--538", + doi = "10.1007/978-981-95-5119-4_16", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:CinLaiWoo25, + author = "Valerio Cini and + Russell W. F. Lai and + Ivy K. Y. Woo", + title = "Pilvi: Lattice Threshold {PKE} with Small Decryption Shares and Improved Security", + pages = "539--569", + doi = "10.1007/978-981-95-5119-4_17", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:WSYGGL25, + author = "Xinzhou Wang and + Shifeng Sun and + Rupeng Yang and + Junqing Gong and + Dawu Gu and + Yuan Luo", + title = "Threshold Homomorphic Secret Sharing: Definitions and Constructions", + pages = "570--600", + doi = "10.1007/978-981-95-5119-4_18", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:JarNaz25, + author = "Stanislaw Jarecki and + Phillip Nazarian", + title = "Adaptively Secure Threshold Blind {BLS} Signatures and Threshold Oblivious {PRF}", + pages = "601--634", + doi = "10.1007/978-981-95-5119-4_19", + crossref = asiacrypt25-6, +} + +@InProceedings{AC:BerJoy25, + author = "Olivier Bernard and + Marc Joye", + title = "Bootstrapping ({T}){FHE} Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys", + pages = "3--35", + doi = "10.1007/978-981-95-5122-4_1", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:CorSeu25, + author = "Jean-S{\'e}bastien Coron and + Tim Seur{\'e}", + title = "{PaCo}: Bootstrapping for {CKKS} via Partial {CoeffToSlot}", + pages = "36--67", + doi = "10.1007/978-981-95-5122-4_2", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:BORT25, + author = "Loris Bergerat and + Jean-Baptiste Orfila and + Adeline {Roux-Langlois} and + Samuel Tap", + title = "Accelerating {TFHE} with Sorted Bootstrapping Techniques", + pages = "68--100", + doi = "10.1007/978-981-95-5122-4_3", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:MHWW25, + author = "Shihe Ma and + Tairong Huang and + Anyu Wang and + Xiaoyun Wang", + title = "Practical Dense-Key Bootstrapping with Subring Secret Encapsulation", + pages = "101--130", + doi = "10.1007/978-981-95-5122-4_4", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:HwaMinSon25, + author = "Intak Hwang and + Seonhong Min and + Yongsoo Song", + title = "Carousel: Fully Homomorphic Encryption with Bootstrapping over Automorphism Group", + pages = "131--164", + doi = "10.1007/978-981-95-5122-4_5", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:OkaTak25, + author = "Hiroki Okada and + Tsuyoshi Takagi", + title = "Low Communication Threshold {FHE} from Standard (Module-){LWE}", + pages = "165--198", + doi = "10.1007/978-981-95-5122-4_6", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:MadSca25, + author = "Varun Madathil and + Alessandra Scafuro", + title = "{sfPri} tt {FHEsfte}: Achieving Full-Privacy in Account-Based Cryptocurrencies is Possible", + pages = "199--229", + doi = "10.1007/978-981-95-5122-4_7", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:ZCAWWG25, + author = "Feixiang Zhao and + Shixin Chen and + Man Ho Au and + Jian Weng and + Huaxiong Wang and + Jian Guo", + title = "Bootstrappable Fully Homomorphic Attribute-Based Encryption with Unbounded Circuit Depth", + pages = "230--262", + doi = "10.1007/978-981-95-5122-4_8", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:Ogilvie25, + author = "Tabitha Ogilvie", + title = "{IND}-{CPA}-{D} and {KR}-{D} Security with Reduced Noise from the {HintLWE} Problem", + pages = "263--295", + doi = "10.1007/978-981-95-5122-4_9", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:HMSS25, + author = "Intak Hwang and + Seonhong Min and + Jinyeong Seo and + Yongsoo Song", + title = "On the Security and Privacy of {CKKS}-Based Homomorphic Evaluation Protocols", + pages = "296--330", + doi = "10.1007/978-981-95-5122-4_10", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:MalMohZap25, + author = "Mary Maller and + Nicolas Mohnblatt and + Aranxta Zapico", + title = "{IVC} in the Open-and-Sign Random Oracle Model", + pages = "333--365", + doi = "10.1007/978-981-95-5122-4_11", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:CheJan25, + author = "Jung Hee Cheon and + Daehyun Jang", + title = "Cryptanalysis on Lightweight Verifiable Homomorphic Encryption", + pages = "366--397", + doi = "10.1007/978-981-95-5122-4_12", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:HasReiKus25, + author = "Sebastian Hasler and + Pascal Reisert and + Ralf K{\"u}sters", + title = "Pseudorandom Correlation Functions from Ring-{LWR}", + pages = "401--438", + doi = "10.1007/978-981-95-5122-4_13", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:BCMRS25, + author = "Lennart Braun and + Geoffroy Couteau and + Kelsey Melissaris and + Mahshid Riahinia and + Elahe Sadeghi", + title = "Fast Pseudorandom Correlation Functions from Sparse {LPN}", + pages = "439--473", + doi = "10.1007/978-981-95-5122-4_14", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:MMST25, + author = "Peihan Miao and + Alice Murphy and + Akshayaram Srinivasan and + Max Tromanhauser", + title = "Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb {{F}}_2$", + pages = "474--504", + doi = "10.1007/978-981-95-5122-4_15", + crossref = asiacrypt25-7, +} + +@InProceedings{AC:CCLYHX25, + author = "Qi Cheng and + Hongru Cao and + Sian-Jheng Lin and + Nenghai Yu and + Yunghsiang S. Han and + Xianhong Xie", + title = "A Construction of Evolving k-Threshold Secret Sharing Scheme over {A} Polynomial Ring", + pages = "3--33", + doi = "10.1007/978-981-95-5125-5_1", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:KogAbe25, + author = "Hiroki Koga and + Hiroto Abe", + title = "New Tight Bounds on the Local Leakage Resilience of the Additive (n, n)-Threshold Scheme Determined by the Eigenvalues of Circulant Matrices", + pages = "34--66", + doi = "10.1007/978-981-95-5125-5_2", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:FraGiaVen25, + author = "Danilo Francati and + Sara Giammusso and + Daniele Venturi", + title = "Taming Adaptive Security and New Access Structures in Evolving Secret Sharing", + pages = "67--98", + doi = "10.1007/978-981-95-5125-5_3", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:LuNasWat25, + author = "George Lu and + Shafik Nassar and + Brent Waters", + title = "Succinct Computational Secret Sharing for Monotone Circuits", + pages = "99--129", + doi = "10.1007/978-981-95-5125-5_4", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:DJWW25, + author = "Lalita Devadas and + Abhishek Jain and + Brent Waters and + David J. Wu", + title = "Succinct Witness Encryption for Batch Languages and Applications", + pages = "130--162", + doi = "10.1007/978-981-95-5125-5_5", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:BerBod25, + author = "Thiago Bergamaschi and + Naresh Goud Boddu", + title = "On Split-State Quantum Tamper Detection", + pages = "165--192", + doi = "10.1007/978-981-95-5125-5_6", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:PenCaoXue25, + author = "Tianci Peng and + Shujiao Cao and + Rui Xue", + title = "On Quantum Query Complexities of Collision-Finding in Non-uniform Random Functions", + pages = "193--223", + doi = "10.1007/978-981-95-5125-5_7", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:LWWLW25, + author = "Qun Liu and + Haoyang Wang and + Jinliang Wang and + Boyun Li and + Meiqin Wang", + title = "Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool", + pages = "224--255", + doi = "10.1007/978-981-95-5125-5_8", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:HulKudMaj25, + author = "Andreas H{\"u}lsing and + Mikhail A. Kudinov and + Christian Majenz", + title = "Hybrid-Query Bounds with Partial Input Control Framework and Application to Tight {M}-{eTCR}", + pages = "256--286", + doi = "10.1007/978-981-95-5125-5_9", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:Jaeger25, + author = "Joseph Jaeger", + title = "Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming", + pages = "287--319", + doi = "10.1007/978-981-95-5125-5_10", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:BBOSS25, + author = "Mohammed Barhoush and + Amit Behera and + Lior Ozer and + Louis Salvail and + Or Sattath", + title = "Signatures From Pseudorandom States via $\bot $-{PRFs}", + pages = "320--349", + doi = "10.1007/978-981-95-5125-5_11", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:GLPTY25, + author = "Vipul Goyal and + Xiao Liang and + Omkant Pandey and + Yuhao Tang and + Takashi Yamakawa", + title = "Round-Efficient Composable Two-Party Quantum Computation", + pages = "350--380", + doi = "10.1007/978-981-95-5125-5_12", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:AbbKat25, + author = "Kasra Abbaszadeh and + Jonathan Katz", + title = "Non-Interactive Zero-Knowledge Arguments with Certified Deletion", + pages = "381--410", + doi = "10.1007/978-981-95-5125-5_13", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:LPTY25, + author = "Xiao Liang and + Omkant Pandey and + Yuhao Tang and + Takashi Yamakawa", + title = "Almost-Total Puzzles and Their Applications", + pages = "411--443", + doi = "10.1007/978-981-95-5125-5_14", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:YOFA25, + author = "Kazuki Yamamura and + Tetsuya Okuda and + Eiichiro Fujisaki and + Masayuki Abe", + title = "On the Limits of Non-interactive Blind Signatures", + pages = "447--481", + doi = "10.1007/978-981-95-5125-5_15", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:SchVor25, + author = "Sven Sch{\"a}ge and + Marc Vorstermans", + title = "New Limits for Homomorphic Encryption", + pages = "482--515", + doi = "10.1007/978-981-95-5125-5_16", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:BarNisYam25, + author = "Mohammed Barhoush and + Ryo Nishimaki and + Takashi Yamakawa", + title = "{MicroCrypt} Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations", + pages = "516--548", + doi = "10.1007/978-981-95-5125-5_17", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:ZhaWu25, + author = "Forest Zhang and + Ke Wu", + title = "Game-Theoretically Fair Coin Toss with Arbitrary Preferences", + pages = "549--581", + doi = "10.1007/978-981-95-5125-5_18", + crossref = asiacrypt25-8, +} + +@InProceedings{AC:FriLehOzb25, + author = "Karla Friedrichs and + Anja Lehmann and + Cavit {\"O}zbay", + title = "Game Changer: {A} Modular Framework for {OPRF} Security", + pages = "582--613", + doi = "10.1007/978-981-95-5125-5_19", + crossref = asiacrypt25-8, +} + @InProceedings{AC:ADMSW24, author = "Gennaro Avitabile and Nico D{\"o}ttling and @@ -99552,6 +101057,353 @@ @InProceedings{AC:Ames90 crossref = asiacrypt90, } +@InProceedings{CANS:BanDevSmi25, + author = "Gustavo Banegas and + Ana{\"e}lle Le D{\'e}v{\'e}hat and + Benjamin Smith", + title = "Compressed Verification for Post-quantum Signatures with Long-Term Public Keys", + pages = "3--26", + doi = "10.1007/978-981-95-4434-9_1", + crossref = cans25, +} + +@InProceedings{CANS:HLCXW25, + author = "Qingjie Hu and + Zhen Liu and + Yuchen Cao and + Guanju Xiao and + Jianhua Wang", + title = "Generalizing Key Recovery Attacks Against {NTRU} with Multiple Keys and Its Application in {NTRUReEncrypt}", + pages = "27--45", + doi = "10.1007/978-981-95-4434-9_2", + crossref = cans25, +} + +@InProceedings{CANS:KSDLRF25, + author = "Thanh Xuan Khuc and + Willy Susilo and + Dung Hoang Duong and + Yannan Li and + Partha Sarathi Roy and + Kazuhide Fukushima and + Shinsaku Kiyomoto", + title = "Strong Designated Verifier Signatures from Isogeny Assumptions", + pages = "46--69", + doi = "10.1007/978-981-95-4434-9_3", + crossref = cans25, +} + +@InProceedings{CANS:KLSRG25, + author = "Markus Krausz and + Georg Land and + Florian Stolz and + Jan Richter-Brockmann and + Tim G{\"u}neysu", + title = "To Extend or Not to Extend: Agile Masking Instructions for {PQC}", + pages = "70--92", + doi = "10.1007/978-981-95-4434-9_4", + crossref = cans25, +} + +@InProceedings{CANS:AmiBatMel25, + author = "Parisa Amiri-Eliasi and + Lejla Batina and + Silvia Mella", + title = "Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation", + pages = "95--119", + doi = "10.1007/978-981-95-4434-9_5", + crossref = cans25, +} + +@InProceedings{CANS:BAMV25, + author = "Amit Singh Bhati and + Elena Andreeva and + Simon M{\"u}ller and + Damian Viz{\'a}r", + title = "Sonikku: Gotta Speed, Keed! {A} Family of Fast and Secure {MACs}", + pages = "120--141", + doi = "10.1007/978-981-95-4434-9_6", + crossref = cans25, +} + +@InProceedings{CANS:BonMea25, + author = "Luca Bonamino and + Pierrick M{\'e}aux", + title = "Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions", + pages = "142--169", + doi = "10.1007/978-981-95-4434-9_7", + crossref = cans25, +} + +@InProceedings{CANS:BuiCon25, + author = "Dung Bui and + Kelong Cong", + title = "Efficient Fuzzy Labeled {PSI} from Vector Ring-{OLE}", + pages = "173--198", + doi = "10.1007/978-981-95-4434-9_8", + crossref = cans25, +} + +@InProceedings{CANS:HonShi25, + author = "Yoshiaki Honda and + Kazumasa Shinagawa", + title = "Efficient Three-Input and Four-Input {AND} Protocols Using Playing Cards with Partial-Open Actions", + pages = "199--212", + doi = "10.1007/978-981-95-4434-9_9", + crossref = cans25, +} + +@InProceedings{CANS:IISLSM25, + author = "Shizuru Iino and + Shota Ikeda and + Kazumasa Shinagawa and + Yang Li and + Kazuo Sakiyama and + Daiki Miyahara", + title = "Impossibility of Four-Card {AND} Protocols with a Single Closed Shuffle", + pages = "213--229", + doi = "10.1007/978-981-95-4434-9_10", + crossref = cans25, +} + +@InProceedings{CANS:BKRR25, + author = "Thomas Buchsteiner and + Karl W. Koch and + Dragos Rotaru and + Christian Rechberger", + title = "{webSPDZ}: Versatile {MPC} on the Web", + pages = "230--248", + doi = "10.1007/978-981-95-4434-9_11", + crossref = cans25, +} + +@InProceedings{CANS:ImuEmu25, + author = "Yuto Imura and + Keita Emura", + title = "Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption", + pages = "251--271", + doi = "10.1007/978-981-95-4434-9_12", + crossref = cans25, +} + +@InProceedings{CANS:YosEmu25, + author = "Takeshi Yoshida and + Keita Emura", + title = "On the Relations Between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search", + pages = "272--291", + doi = "10.1007/978-981-95-4434-9_13", + crossref = cans25, +} + +@InProceedings{CANS:ZhaWanChe25, + author = "Qi Zhang and + Mingqiang Wang and + Xiaopeng Cheng", + title = "Faster {FHEW} Bootstrapping with Adaptive Key Update", + pages = "292--312", + doi = "10.1007/978-981-95-4434-9_14", + crossref = cans25, +} + +@InProceedings{CANS:CMMTZ25, + author = "Liqun Chen and + Long Meng and + Mark Manulis and + Yangguang Tian and + Yinghui Zhang", + title = "Attribute-Based Key Exchange with Optimal Efficiency", + pages = "315--334", + doi = "10.1007/978-981-95-4434-9_15", + crossref = cans25, +} + +@InProceedings{CANS:DelLal25, + author = "Hugo Delavenne and + Louise Lallemand", + title = "Codes on Any Cayley Graph Have an Interactive Oracle Proof of Proximity", + pages = "335--357", + doi = "10.1007/978-981-95-4434-9_16", + crossref = cans25, +} + +@InProceedings{CANS:MVVZ25, + author = "Pierpaolo Della Monica and + Ivan Visconti and + Andrea Vitaletti and + Marco Zecchini", + title = "Decentralized Fair Exchange with Advertising", + pages = "358--381", + doi = "10.1007/978-981-95-4434-9_17", + crossref = cans25, +} + +@InProceedings{CANS:OtoYas25, + author = "Shunya Otomo and + Kenji Yasunaga", + title = "Revisiting Rational Broadcast Protocols", + pages = "382--401", + doi = "10.1007/978-981-95-4434-9_18", + crossref = cans25, +} + +@InProceedings{CANS:AHCM25, + author = "Shiva Agarwal and + Suvadeep Hajra and + Ayantika Chatterjee and + Debdeep Mukhopadhyay", + title = "{WiperSentinel}: {HPC} Based Wiper Detection with Enhanced {AutoEncoder}", + pages = "405--424", + doi = "10.1007/978-981-95-4434-9_19", + crossref = cans25, +} + +@InProceedings{CANS:BASS25, + author = "Maksuda Bilkis Baby and + Md. Atabuzzaman and + Md Shajalal and + Gunnar Stevens", + title = "Attention-Based Code Summarization for Multi-label Vulnerability Detection", + pages = "425--447", + doi = "10.1007/978-981-95-4434-9_20", + crossref = cans25, +} + +@InProceedings{CANS:CWPSQ25, + author = "Cong Cao and + Xiaohan Wang and + Shunda Pan and + Guohang Shen and + Haipeng Qu", + title = "Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirectional Tree-Structured Embedding Model", + pages = "448--466", + doi = "10.1007/978-981-95-4434-9_21", + crossref = cans25, +} + +@InProceedings{CANS:SOvBJ25a, + author = "Stefano Simonetto and + Ronan Oosteven and + Thijs {van Ede} and + Peter Bosch and + Willem Jonker", + title = "What Matters Most in Vulnerabilities? {K}ey Term Extraction for {CVE}-to-{CWE} Mapping with {LLMs}", + pages = "467--492", + doi = "10.1007/978-981-95-4434-9_22", + crossref = cans25, +} + +@InProceedings{CANS:SOvBJ25b, + author = "Stefano Simonetto and + Ronan Oosteven and + Thijs {van Ede} and + Peter Bosch and + Willem Jonker", + title = "Beyond {CWEs}: Mapping Weaknesses in Unstructured Threat Intelligence Text", + pages = "493--517", + doi = "10.1007/978-981-95-4434-9_23", + crossref = cans25, +} + +@InProceedings{CANS:LinMayRol25, + author = "Mario Lins and + Ren{\'e} Mayrhofer and + Michael Roland", + title = "Unveiling the Critical Attack Path for Implanting Backdoors in Supply Chains: Practical Experience from {XZ}", + pages = "521--541", + doi = "10.1007/978-981-95-4434-9_24", + crossref = cans25, +} + +@InProceedings{CANS:MAMS25, + author = "Mohammad Mamun and + Hadeer Ahmed and + Anas Mabrouk and + Sherif Saad", + title = "Synthetic Lateral Movement Data Generation for Azure Cloud: {A} Hopper-Based Approach", + pages = "542--561", + doi = "10.1007/978-981-95-4434-9_25", + crossref = cans25, +} + +@InProceedings{CANS:TahRah25, + author = "Alireza Tahiritajar and + Reza Rahaeimehr", + title = "Acoustic Side Channel Attack on Keyboards Based on Typing Patterns", + pages = "562--578", + doi = "10.1007/978-981-95-4434-9_26", + crossref = cans25, +} + +@InProceedings{CANS:BCGTTZ25, + author = "Daniel Berend and + Amit Cohen and + Shahar Golan and + Boris Tsirkin and + Yochai Twitto and + Itamar Zimerman", + title = "Enhancing Cold Boot Attacks with Probabilistic-Guided {SAT}-Solvers", + pages = "581--590", + doi = "10.1007/978-981-95-4434-9_27", + crossref = cans25, +} + +@InProceedings{CANS:GonMas25, + author = "Brian Goncalves and + Atefeh Mashatan", + title = "{DiSK} - {A} Deniable Split {KEM} from Lattices", + pages = "591--601", + doi = "10.1007/978-981-95-4434-9_28", + crossref = cans25, +} + +@InProceedings{CANS:HulLanWeb25, + author = "Andreas H{\"u}lsing and + Tanja Lange and + Fiona Johanna Weber", + title = "A Key-Update Mechanism for the Space Data Link Security Protocol", + pages = "602--611", + doi = "10.1007/978-981-95-4434-9_29", + crossref = cans25, +} + +@InProceedings{CANS:JouVol25, + author = "Maxim Jourenko and + Marcus V{\"o}lker", + title = "Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes", + pages = "612--621", + doi = "10.1007/978-981-95-4434-9_30", + crossref = cans25, +} + +@InProceedings{CANS:NinPhaDun25, + author = "Quoc-Bao Ninh and + Cao Quang Phat and + Tran Trung Dung", + title = "Fully Verifiable Ciphertext-Policy Attribute-Based Encryption", + pages = "622--630", + doi = "10.1007/978-981-95-4434-9_31", + crossref = cans25, +} + +@InProceedings{CANS:ROMJ25, + author = "Furqan Rustam and + Islam Obaidat and + Davide Di Monda and + Anca Delia Jurcut", + title = "Few-Shot Retrieval-Augmented {LLMs} for Anomaly Detection in Network Traffic", + pages = "631--642", + doi = "10.1007/978-981-95-4434-9_32", + crossref = cans25, +} + +@InProceedings{CANS:Sugio25, + author = "Nobuyuki Sugio", + title = "Impossible Differential Attack on {SAND}-128", + pages = "643--655", + doi = "10.1007/978-981-95-4434-9_33", + crossref = cans25, +} + @InProceedings{CANS:WLLD24, author = "Dongyu Wu and Bei Liang and @@ -137180,6 +139032,395 @@ @InProceedings{C:DKDGS81 crossref = crypto81, } +@InProceedings{CSF:DFGLL25, + author = "Scott L. Dyer and + Christian A. Femrite and + Joshua D. Guttman and + Julian P. Lanson and + Moses D. Liskov", + title = "Cryptographically Assured Information Flow: Assured Remote Execution", + pages = "1--16", + doi = "10.1109/CSF64896.2025.00001", + crossref = csf25, +} + +@InProceedings{CSF:DelHerLal25, + author = "St{\'e}phanie Delaune and + Cl{\'e}ment H{\'e}rouard and + Joseph Lallemand", + title = "Secrecy by Typing in the Computational Model", + pages = "17--32", + doi = "10.1109/CSF64896.2025.00006", + crossref = csf25, +} + +@InProceedings{CSF:BusFocLuc25, + author = "Matteo Busi and + Riccardo Focardi and + Flaminia L. Luccio", + title = "Strands Rocq: Why is a Security Protocol Correct, Mechanically?", + pages = "33--48", + doi = "10.1109/CSF64896.2025.00022", + crossref = csf25, +} + +@InProceedings{CSF:MarKoh25, + author = "Lorenzo Martinico and + Markulf Kohlweiss", + title = "{AGATE}: Augmented Global Attested Trusted Execution in the Universal Composability Framework", + pages = "49--64", + doi = "10.1109/CSF64896.2025.00008", + crossref = csf25, +} + +@InProceedings{CSF:AthChaPal25, + author = "Andreas Athanasiou and + Konstantinos Chatzikokolakis and + Catuscia Palamidessi", + title = "Self-Defense: Optimal {QIF} Solutions and Application to Website Fingerprinting", + pages = "65--80", + doi = "10.1109/CSF64896.2025.00002", + crossref = csf25, +} + +@InProceedings{CSF:Pan25a, + author = "Mingen Pan", + title = "Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting", + pages = "81--96", + doi = "10.1109/CSF64896.2025.00014", + crossref = csf25, +} + +@InProceedings{CSF:Pan25b, + author = "Mingen Pan", + title = "Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries", + pages = "97--112", + doi = "10.1109/CSF64896.2025.00024", + crossref = csf25, +} + +@InProceedings{CSF:SanBaiGab25, + author = "Victor Sannier and + Patrick Baillot and + Marco Gaboardi", + title = "Session Types for the Concurrent Composition of Interactive Differential Privacy", + pages = "113--126", + doi = "10.1109/CSF64896.2025.00020", + crossref = csf25, +} + +@InProceedings{CSF:LauPanVak25, + author = "Peeter Laud and + Alisa Pankova and + Jelizaveta Vakarjuk", + title = "Privacy-Preserving Server-Supported Decryption", + pages = "127--142", + doi = "10.1109/CSF64896.2025.00004", + crossref = csf25, +} + +@InProceedings{CSF:JakLiuMad25, + author = "Sashidhar Jakkamsetti and + Zeyu Liu and + Varun Madathil", + title = "Scalable Private Signaling", + pages = "143--158", + doi = "10.1109/CSF64896.2025.00035", + crossref = csf25, +} + +@InProceedings{CSF:HasYamHar25, + author = "Keitaro Hashimoto and + Kyosuke Yamashita and + Keisuke Hara", + title = "Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation", + pages = "159--174", + doi = "10.1109/CSF64896.2025.00012", + crossref = csf25, +} + +@InProceedings{CSF:BRSSv25, + author = "L{\'e}onard Brice and + Jean-Fran{\c c}ois Raskin and + Mathieu Sassolas and + Guillaume Scerri and + Marie {van den Bogaard}", + title = "Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents", + pages = "175--189", + doi = "10.1109/CSF64896.2025.00003", + crossref = csf25, +} + +@InProceedings{CSF:Terauchi25, + author = "Tachio Terauchi", + title = "On {DoS} Vulnerability of Regular Expressions, with and Without Backreferences", + pages = "190--204", + doi = "10.1109/CSF64896.2025.00011", + crossref = csf25, +} + +@InProceedings{CSF:ZhaWarNgu25, + author = "Yumeng Zhang and + Max Ward and + Hung Nguyen", + title = "Rethinking Attack Path Management: {A} New Metric for Choke Points in Attack Graphs", + pages = "205--219", + doi = "10.1109/CSF64896.2025.00018", + crossref = csf25, +} + +@InProceedings{CSF:WimDowAln25, + author = "Bhagya Wimalasiri and + Benjamin Dowling and + Rabiah Alnashwan", + title = "Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers", + pages = "220--235", + doi = "10.1109/CSF64896.2025.00007", + crossref = csf25, +} + +@InProceedings{CSF:XTLM25, + author = "Jian Xiang and + Simone Tini and + Ruggero Lanotte and + Massimo Merro", + title = "Formal Robustness for Cyber-Physical Systems Under Timed Attacks", + pages = "236--251", + doi = "10.1109/CSF64896.2025.00028", + crossref = csf25, +} + +@InProceedings{CSF:KozSchCho25, + author = "Elisavet Kozyri and + Fred B. Schneider and + Stephen Chong", + title = "Accountability, Involvement, and Mediation for Information Flow", + pages = "252--267", + doi = "10.1109/CSF64896.2025.00013", + crossref = csf25, +} + +@InProceedings{CSF:RajColKan25, + author = "Vineet Rajani and + Alex Coleman and + Hrutvik Kanabar", + title = "A Graded Modal Approach to Relaxed Semantic Declassification", + pages = "268--283", + doi = "10.1109/CSF64896.2025.00032", + crossref = csf25, +} + +@InProceedings{CSF:AABGD25, + author = "Anoud Alshnakat and + Amir M. Ahmadian and + Musard Balliu and + Roberto Guanciale and + Mads Dam", + title = "Securing {P4} Programs by Information Flow Control", + pages = "284--299", + doi = "10.1109/CSF64896.2025.00031", + crossref = csf25, +} + +@InProceedings{CSF:DBMS25, + author = "Stephan D{\"u}bler and + Federico Badaloni and + Pedro {Moreno-Sanchez} and + Clara Schneidewind", + title = "Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain Ecosystems", + pages = "300--315", + doi = "10.1109/CSF64896.2025.00016", + crossref = csf25, +} + +@InProceedings{CSF:BHOMS25, + author = "Federico Badaloni and + Sebastian Holler and + Chrysoula Oikonomou and + Pedro {Moreno-Sanchez} and + Clara Schneidewind", + title = "${BitML}^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style Cryptocurrencies", + pages = "316--330", + doi = "10.1109/CSF64896.2025.00017", + crossref = csf25, +} + +@InProceedings{CSF:GHKMMS25, + author = "Jacob Gorman and + Lucjan Hanzlik and + Aniket Kate and + Easwar Vivek Mangipudi and + Pratyay Mukherjee and + Pratik Sarkar and + Sri Aravinda Krishnan Thyagarajan", + title = "{VRaaS}: Verifiable Randomness as a Service on Blockchains", + pages = "331--346", + doi = "10.1109/CSF64896.2025.00034", + crossref = csf25, +} + +@InProceedings{CSF:HRSJB25, + author = "Xenia Hofmeier and + Andrea Raguso and + Ralf Sasse and + Dennis Jackson and + David A. Basin", + title = "One For All: Formally Verifying Protocols which use Aggregate Signatures", + pages = "347--362", + doi = "10.1109/CSF64896.2025.00027", + crossref = csf25, +} + +@InProceedings{CSF:LarSch25, + author = "Markus Krabbe Larsen and + Carsten Sch{\"u}rmann", + title = "Nominal State-Separating Proofs", + pages = "363--377", + doi = "10.1109/CSF64896.2025.00038", + crossref = csf25, +} + +@InProceedings{CSF:NasKunNem25, + author = "Faezeh Nasrabadi and + Robert K{\"u}nnemann and + Hamed Nemati", + title = "Symbolic Parallel Composition for Multi-language Protocol Verification", + pages = "378--393", + doi = "10.1109/CSF64896.2025.00030", + crossref = csf25, +} + +@InProceedings{CSF:AvoClaDel25, + author = "Gildas Avoine and + Tristan Claverie and + St{\'e}phanie Delaune", + title = "Formal Analysis of Random Nonce Misuses in Cryptographic Protocols", + pages = "394--409", + doi = "10.1109/CSF64896.2025.00037", + crossref = csf25, +} + +@InProceedings{CSF:LiuWan25, + author = "Yifeng Liu and + Zehua Wang", + title = "A Novel Approach to Differential Privacy with Alpha Divergence", + pages = "410--424", + doi = "10.1109/CSF64896.2025.00009", + crossref = csf25, +} + +@InProceedings{CSF:BSBK25, + author = "Adda-Akram Bendoukha and + Renaud Sirdey and + Aymen Boudguiga and + Nesrine Kaaniche", + title = "Unveiling the (in)Security of Threshold {FHE}-Based Federated Learning: The Practical Impact of Recent {CPAD} Attacks", + pages = "425--440", + doi = "10.1109/CSF64896.2025.00025", + crossref = csf25, +} + +@InProceedings{CSF:HMMR25, + author = "Thomas Haines and + Rafieh Mosaheb and + Johannes M{\"u}ller and + Reetika", + title = "Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application", + pages = "441--456", + doi = "10.1109/CSF64896.2025.00010", + crossref = csf25, +} + +@InProceedings{CSF:RauHubKus25, + author = "Daniel Rausch and + Nicolas Huber and + Ralf K{\"u}sters", + title = "Verifiable {E}-Voting with a Trustless Bulletin Board", + pages = "457--472", + doi = "10.1109/CSF64896.2025.00033", + crossref = csf25, +} + +@InProceedings{CSF:LonGarDra25, + author = "Callum London and + Daniel Gardham and + Constantin Catalin Dragan", + title = "Dynamic Group Signatures with Verifier-Local Revocation", + pages = "473--488", + doi = "10.1109/CSF64896.2025.00026", + crossref = csf25, +} + +@InProceedings{CSF:MPSST25, + author = "Stefan Milius and + Dominik Paulus and + Dominique Schr{\"o}der and + Lutz Schr{\"o}der and + Julian Thomas", + title = "Automated Analysis and Synthesis of Message Authentication Codes", + pages = "489--504", + doi = "10.1109/CSF64896.2025.00015", + crossref = csf25, +} + +@InProceedings{CSF:BaeDelRio25, + author = "David Baelde and + St{\'e}phanie Delaune and + Stanislas Riou", + title = "{SMT}-Based Automation for Overwhelming Truth", + pages = "505--520", + doi = "10.1109/CSF64896.2025.00019", + crossref = csf25, +} + +@InProceedings{CSF:CheFon25, + author = "Vincent Cheval and + Caroline Fontaine", + title = "Automatic Verification of Finite Variant Property Beyond Convergent Equational Theories", + pages = "521--536", + doi = "10.1109/CSF64896.2025.00005", + crossref = csf25, +} + +@InProceedings{CSF:Cecchetti25, + author = "Ethan Cecchetti", + title = "Nonmalleable Progress Leakage", + pages = "537--552", + doi = "10.1109/CSF64896.2025.00029", + crossref = csf25, +} + +@InProceedings{CSF:ArqTorTan25, + author = "Dami{\'a}n {\'A}rquez and + Mat{\'i}as Toro and + {\'E}ric Tanter", + title = "Gradual Sensitivity Typing", + pages = "553--568", + doi = "10.1109/CSF64896.2025.00021", + crossref = csf25, +} + +@InProceedings{CSF:BBDHH25, + author = "Jonathan Baumann and + Roberto Blanco and + L{\'e}on Ducruet and + Sebastian Harwig and + Catalin Hritcu", + title = "{FSLH}: Flexible Mechanized Speculative Load Hardening", + pages = "569--584", + doi = "10.1109/CSF64896.2025.00023", + crossref = csf25, +} + +@InProceedings{CSF:ZarSad25, + author = "Mohammad A. Zarrabian and + Parastoo Sadeghi", + title = "An Extension of the Adversarial Threat Model in Quantitative Information Flow", + pages = "585--600", + doi = "10.1109/CSF64896.2025.00036", + crossref = csf25, +} + @InProceedings{CSF:RamSunSur24, author = "R. Ramanujam and Vaishnavi Sundararajan and @@ -148866,6 +151107,1140 @@ @InProceedings{RSA:Fischlin01 crossref = rsa01, } +@InProceedings{ESORICS:AbaPicUrb25, + author = "Gorka Abad and + Stjepan Picek and + Aitor Urbieta", + title = "Time-Distributed Backdoor Attacks on Federated Spiking Learning", + pages = "1--20", + doi = "10.1007/978-3-032-07884-1_1", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:AFCK25, + author = "Omar Anser and + J{\'e}r{\^o}me Fran{\c c}ois and + Isabelle Chrisment and + Daishi Kondo", + title = "{TATA}: Benchmark {NIDS} Test Sets Assessment and Targeted Augmentation", + pages = "21--41", + doi = "10.1007/978-3-032-07884-1_2", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:AHHKMN25, + author = "Nuttapong Attrapadung and + Goichiro Hanaoaka and + Ryo Hiromasa and + Yoshihiro Koseki and + Takahiro Matsuda and + Yutaro Nishida and + Yusuke Sakai and + Jacob C. N. Schuldt and + Satoshi Yasuda", + title = "Abuse-Resistant Evaluation of {AI}-as-a-Service via Function-Hiding Homomorphic Signatures", + pages = "42--61", + doi = "10.1007/978-3-032-07884-1_3", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:BCDFS25, + author = "Michele Barbato and + Alberto Ceselli and + Sabrina {De Capitani di Vimercati} and + Sara Foresti and + Pierangela Samarati", + title = "{PriSM}: {A} Privacy-Friendly Support Vector Machine", + pages = "62--82", + doi = "10.1007/978-3-032-07884-1_4", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:BreMou25, + author = "Hugo Breniaux and + Djedjiga Mouheb", + title = "Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models", + pages = "83--102", + doi = "10.1007/978-3-032-07884-1_5", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:CHBDK25, + author = "Sara Chennoufi and + Yufei Han and + Gregory Blanc and + Emiliano {De Cristofaro} and + Christophe Kiennert", + title = "{PROTEAN}: Federated Intrusion Detection in Non-{IID} Environments Through Prototype-Based Knowledge Sharing", + pages = "103--125", + doi = "10.1007/978-3-032-07884-1_6", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:GanConPau25, + author = "Ankit Gangwal and + Mauro Conti and + Tommaso Pauselli", + title = "{KeTS}: Kernel-Based Trust Segmentation Against Model Poisoning Attacks", + pages = "126--146", + doi = "10.1007/978-3-032-07884-1_7", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:GCLION25, + author = "Mahmoud Ghorbel and + Selina Cheggour and + Valeria Loscr{\`i} and + Youcef Imine and + Hamza Ouarnoughi and + Sma{\"i}l Niar", + title = "Machine Learning Vulnerabilities in {6G}: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in {UC}-{CFmMIMO}", + pages = "147--165", + doi = "10.1007/978-3-032-07884-1_8", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:HalAhmCam25, + author = "Sajal Halder and + Muhammad Ejaz Ahmed and + Seyit Camtepe", + title = "{FuncVul}: An Effective Function Level Vulnerability Detection Model Using {LLM} and Code Chunk", + pages = "166--185", + doi = "10.1007/978-3-032-07884-1_9", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:IGdAG25, + author = "Luis Iba{\~n}ez-Lissen and + Lorena Gonz{\'a}lez-Manzano and + Jos{\'e} Mar{\'i}a {de Fuentes} and + Nicolas Anciaux and + Joaqu{\'i}n Garc{\'i}a", + title = "{LUMIA}: Linear Probing for Unimodal and {MultiModal} Membership Inference Attacks Leveraging Internal {LLM} States", + pages = "186--206", + doi = "10.1007/978-3-032-07884-1_10", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:LAPC25, + author = "Jiaxin Li and + Gorka Abad and + Stjepan Picek and + Mauro Conti", + title = "Membership Privacy Evaluation in Deep Spiking Neural Networks", + pages = "207--227", + doi = "10.1007/978-3-032-07884-1_11", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:MAPC25, + author = "Francesco Marchiori and + Marco Alecci and + Luca Pajola and + Mauro Conti", + title = "{DUMB} and {DUMBer}: Is Adversarial Training Worth It in the Real World?", + pages = "228--248", + doi = "10.1007/978-3-032-07884-1_12", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:NKYC25, + author = "Hyunsik Na and + Hajun Kim and + Dooshik Yoon and + Daeseon Choi", + title = "Countering Jailbreak Attacks with Two-Axis Pre-detection and Conditional Warning Wrappers", + pages = "249--268", + doi = "10.1007/978-3-032-07884-1_13", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:NouBlaRob25, + author = "B{\'e}no{\^i}t Nougnanke and + Gregory Blanc and + Thomas Robert", + title = "How Dataset Diversity Affects Generalization in {ML}-Based {NIDS}", + pages = "269--288", + doi = "10.1007/978-3-032-07884-1_14", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:OucDup25, + author = "Dyna Soumhane Ouchebara and + St{\'e}phane Dupont", + title = "Llama-Based Source Code Vulnerability Detection: Prompt Engineering vs Fine Tuning", + pages = "289--308", + doi = "10.1007/978-3-032-07884-1_15", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:QGLHZL25, + author = "Fuqi Qi and + Haichang Gao and + Boling Li and + Guangyu He and + Yuhong Zhang and + Jiacheng Luo", + title = "{DBBA}: Diffusion-Based Backdoor Attacks on Open-Set Face Recognition Models", + pages = "309--327", + doi = "10.1007/978-3-032-07884-1_16", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:ReaMcLSco25, + author = "Matthew Reaney and + Kieran McLaughlin and + Sandra Scott-Hayward", + title = "Evaluation of Autonomous Intrusion Response Agents in Adversarial and Normal Scenarios", + pages = "328--345", + doi = "10.1007/978-3-032-07884-1_17", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:RNSJ25, + author = "Preston K. Robinette and + Thuy Dung Nguyen and + Samuel Sasaki and + Taylor T. Johnson", + title = "Trigger-Based Fragile Model Watermarking for Image Transformation Networks", + pages = "346--365", + doi = "10.1007/978-3-032-07884-1_18", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:SWRHL25, + author = "Md Hasan Shahriar and + Ning Wang and + Naren Ramakrishnan and + Y. Thomas Hou and + Wenjing Lou", + title = "Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks", + pages = "366--387", + doi = "10.1007/978-3-032-07884-1_19", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:WCWY25, + author = "Kerui Wu and + Ka-Ho Chow and + Wenqi Wei and + Lei Yu", + title = "On the Adversarial Robustness of Graph Neural Networks with Graph Reduction", + pages = "388--409", + doi = "10.1007/978-3-032-07884-1_20", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:WLLNL25, + author = "Xiaodong Wu and + Xiangman Li and + Qi Li and + Jianbing Ni and + Rongxing Lu", + title = "{SecureT2I}: No More Unauthorized Manipulation on {AI} Generated Images from Prompts", + pages = "410--429", + doi = "10.1007/978-3-032-07884-1_21", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:XWLBCR25, + author = "Jiali Xu and + Shuo Wang and + Valeria Loscr{\`i} and + Alessandro Brighente and + Mauro Conti and + Romain Rouvoy", + title = "{GANSec}: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional {GAN} Augmentation", + pages = "430--449", + doi = "10.1007/978-3-032-07884-1_22", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:YagKik25, + author = "Terumi Yaguchi and + Hiroaki Kikuchi", + title = "Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data", + pages = "450--468", + doi = "10.1007/978-3-032-07884-1_23", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:YKGM25, + author = "Zexi Yao and + Natasa Krco and + Georgi Ganev and + Yves-Alexandre de Montjoye", + title = "The {DCR} Delusion: Measuring the Privacy Risk of Synthetic Data", + pages = "469--487", + doi = "10.1007/978-3-032-07884-1_24", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:YALAK25, + author = "Shehel Yoosuf and + Temoor Ali and + Ahmed Lekssays and + Mashael AlSabah and + Issa Khalil", + title = "{StructTransform}: {A} Scalable Attack Surface for Safety-Aligned Large Language Models", + pages = "488--507", + doi = "10.1007/978-3-032-07884-1_25", + crossref = esorics25-1, +} + +@InProceedings{ESORICS:ANOPST25, + author = "Masayuki Abe and + Masaya Nanri and + Miyako Ohkubo and + Octavio Perez-Kempner and + Daniel Slamanig and + Mehdi Tibouchi", + title = "A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts", + pages = "1--21", + doi = "10.1007/978-3-032-07891-9_1", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:AviBotFio25, + author = "Gennaro Avitabile and + Vincenzo Botta and + Dario Fiore", + title = "$\mathfrak {Tetris}$! Traceable Extendable Threshold Ring Signatures and More", + pages = "22--41", + doi = "10.1007/978-3-032-07891-9_2", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:BCSRL25, + author = "Joonsang Baek and + Seongbong Choi and + Willy Susilo and + Partha Sarathi Roy and + Hyung Tae Lee", + title = "Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing", + pages = "42--62", + doi = "10.1007/978-3-032-07891-9_3", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:BXLW25, + author = "Bingxue Bian and + Qiaoer Xu and + Jiatao Liu and + Jianfeng Wang", + title = "Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries", + pages = "63--83", + doi = "10.1007/978-3-032-07891-9_4", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:BHPP25, + author = "Th{\'e}ophile Br{\'e}zot and + Chlo{\'e} H{\'e}bant and + Paola de Perthuis and + David Pointcheval", + title = "Security Analysis of Covercrypt: {A} Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies", + pages = "84--102", + doi = "10.1007/978-3-032-07891-9_5", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:CKKW25, + author = "Adrian Cinal and + Przemyslaw Kubiak and + Miroslaw Kutylowski and + Gabriel Wechta", + title = "Anamorphic Monero Transactions: The Threat of Bypassing Anti-money Laundering Laws", + pages = "103--123", + doi = "10.1007/978-3-032-07891-9_6", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:DRRR25, + author = "Aditya Damodaran and + Simon Rastikian and + Peter B. R{\o}nne and + Peter Y. A. Ryan", + title = "Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation", + pages = "124--143", + doi = "10.1007/978-3-032-07891-9_7", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:FBSHL25, + author = "Qijia Fan and + Chenhao Bao and + Xuanyu Shi and + Shuai Han and + Shengli Liu", + title = "Two-Factor Authenticated Key Exchange with Enhanced Security from Post-quantum Assumptions", + pages = "144--163", + doi = "10.1007/978-3-032-07891-9_8", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:Hamada25, + author = "Koki Hamada", + title = "Concretely Efficient Parallel-Accessible {DORAM} for {100K}-Sized Array", + pages = "164--185", + doi = "10.1007/978-3-032-07891-9_9", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:HerEsc25, + author = "Arturo Hern{\'a}ndez-S{\'a}nchez and + Santiago Escobar", + title = "A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-{NPA}", + pages = "186--204", + doi = "10.1007/978-3-032-07891-9_10", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:KalCheMit25, + author = "Novak Kaluderovic and + Nan Cheng and + Aikaterini Mitrokotsa", + title = "A Post-quantum Distributed {OPRF} from the Legendre {PRF}", + pages = "205--225", + doi = "10.1007/978-3-032-07891-9_11", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:KMCGM25, + author = "Chandan Kumar and + Nimish Mishra and + Suvradip Chakraborty and + Satrajit Ghosh and + Debdeep Mukhopadhyay", + title = "{TERRA}: Trojan-Resilient Reverse-Firewall for Cryptographic Applications", + pages = "226--246", + doi = "10.1007/978-3-032-07891-9_12", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:KumKaj25, + author = "Remma Kumazaki and + Yuichi Kaji", + title = "Reaction Attack on {TFHE}: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme", + pages = "247--261", + doi = "10.1007/978-3-032-07891-9_13", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:LiBoy25, + author = "Qinyi Li and + Xavier Boyen", + title = "Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices", + pages = "262--281", + doi = "10.1007/978-3-032-07891-9_14", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:LWLXJ25, + author = "Chongyu Long and + Yuewu Wang and + Lingguang Lei and + Haoyang Xing and + Jiwu Jing", + title = "{DEBridge}: Towards Secure and Practical Plausibly Deniable Encryption Based on {USB} Bridge Controller", + pages = "282--302", + doi = "10.1007/978-3-032-07891-9_15", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:PalHai25, + author = "Palak and + Thomas Haines", + title = "Formalisation of the {KZG} Polynomial Commitment Schemes in {EasyCrypt}", + pages = "303--320", + doi = "10.1007/978-3-032-07891-9_16", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:PLHSK25, + author = "Jaehwan Park and + Hyeonbum Lee and + Junbeom Hur and + Jae Hong Seo and + Doowon Kim", + title = "{UTRA}: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption", + pages = "321--340", + doi = "10.1007/978-3-032-07891-9_17", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:SLZS25, + author = "Yan Shao and + Yuejun Liu and + Yongbin Zhou and + Mingyao Shao", + title = "Enhanced Key Mismatch Attacks on Lattice-Based {KEMs}: Multi-bit Inference and Ciphertext Generalization", + pages = "341--358", + doi = "10.1007/978-3-032-07891-9_18", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:ULOSM25, + author = "Martin Unterguggenberger and + Lukas Lamster and + Mathias Oberhuber and + Simon Scherer and + Stefan Mangard", + title = "Code Encryption with Intel {TME}-{MK} for Control-Flow Enforcement", + pages = "359--378", + doi = "10.1007/978-3-032-07891-9_19", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:WeiHanLiu25, + author = "Xiaoyang Wei and + Shuai Han and + Shengli Liu", + title = "Optimized Privacy-Preserving Multi-signatures from Discrete Logarithm Assumption", + pages = "379--399", + doi = "10.1007/978-3-032-07891-9_20", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:WZDWZY25, + author = "Zhuo Wu and + Xinxuan Zhang and + Yi Deng and + Yuanju Wei and + Zhongliang Zhang and + Liuyu Yang", + title = "Polylogarithmic Polynomial Commitment Scheme over Galois Rings", + pages = "400--420", + doi = "10.1007/978-3-032-07891-9_21", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:XuHu25, + author = "Changhong Xu and + Honggang Hu", + title = "Efficient Homomorphic Evaluation for Non-polynomial Functions", + pages = "421--441", + doi = "10.1007/978-3-032-07891-9_22", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:YZXLWW25, + author = "Yifan Yang and + Kexin Zhang and + Peng Xu and + Zhaojun Lu and + Wei Wang and + Weiqi Wang and + Kaitai Liang", + title = "Athena: Accelerating {KeySwitch} and Bootstrapping for Fully Homomorphic Encryption on {CUDA} {GPU}", + pages = "442--462", + doi = "10.1007/978-3-032-07891-9_23", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:ZMKE25, + author = "Sara Zain and + Jannik M{\"a}hn and + Stefan K{\"o}psell and + Sebastian Ertel", + title = "Formally-Verified Security Against Forgery of Remote Attestation Using {SSProve}", + pages = "463--484", + doi = "10.1007/978-3-032-07891-9_24", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:ZhaZha25, + author = "Xin Zhang and + Yifan Zhang", + title = "{SafePath}: Encryption-Less On-Demand Input Path Protection for Mobile Devices", + pages = "485--505", + doi = "10.1007/978-3-032-07891-9_25", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:ZZSDWY25, + author = "Xudong Zhu and + Xinxuan Zhang and + Xuyang Song and + Yi Deng and + Yuanju Wei and + Liuyu Yang", + title = "Extending {Groth16} for Disjunctive Statements", + pages = "506--527", + doi = "10.1007/978-3-032-07891-9_26", + crossref = esorics25-2, +} + +@InProceedings{ESORICS:AngRan25, + author = "Kian Kai Ang and + Damith C. Ranasinghe", + title = "{QUIC}-Fuzz: An Effective Greybox Fuzzer For The {QUIC} Protocol", + pages = "1--22", + doi = "10.1007/978-3-032-07894-0_1", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:AusMuhDri25, + author = "C{\'e}drick Austa and + Jan Tobias M{\"u}hlberg and + Jean-Michel Dricot", + title = "Systematic Assessment of Cache Timing Vulnerabilities on {RISC}-{V} Processors", + pages = "23--42", + doi = "10.1007/978-3-032-07894-0_2", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:BLCRWB25, + author = "Eddie Billoir and + Romain Laborde and + Daniele Canavese and + Yves R{\"u}tschl{\'e} and + Ahmad Samer Wazan and + Abdelmalek Benzekri", + title = "No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments", + pages = "43--63", + doi = "10.1007/978-3-032-07894-0_3", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:ChoKumRos25, + author = "Amit Choudhari and + Shorya Kumar and + Christian Rossow", + title = "{NICraft}: Malicious {NIC} Firmware-Based Cache Side-Channel Attack", + pages = "64--83", + doi = "10.1007/978-3-032-07894-0_4", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:ChuMoo25, + author = "Minu Chung and + Hyungon Moon", + title = "Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis", + pages = "84--104", + doi = "10.1007/978-3-032-07894-0_5", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:DBMCP25, + author = "Cristian Daniele and + Timme Bethe and + Marcello Maugeri and + Andrea Continella and + Erik Poll", + title = "{LibAFLstar}: Fast and State-Aware Protocol Fuzzing", + pages = "105--123", + doi = "10.1007/978-3-032-07894-0_6", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:GelMexKat25, + author = "Emiliia Gel{\'o}czi and + Nico Mexis and + Stefan Katzenbeisser", + title = "{PUSH} for Security: {A} {PUF}-Based Protocol to Prevent Session Hijacking", + pages = "124--143", + doi = "10.1007/978-3-032-07894-0_7", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:Gingupalli25, + author = "Sarat Chandra Prasad Gingupalli", + title = "Hardening {HSM} Clusters: Resolving Key Sync Vulnerabilities for Robust {CU} Isolation", + pages = "144--163", + doi = "10.1007/978-3-032-07894-0_8", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:HDGLY25, + author = "Fengliang He and + Hong-Ning Dai and + Hanyang Guo and + Xiapu Luo and + Jiadi Yu", + title = "{AcouListener}: An Inaudible Acoustic Side-Channel Attack on {AR}/{VR} Systems", + pages = "164--183", + doi = "10.1007/978-3-032-07894-0_9", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:HAJRG25, + author = "Martin Heckel and + Florian Adamsky and + Jonas Juffinger and + Fabian Rauscher and + Daniel Gruss", + title = "Verifying {DRAM} Addressing in Software", + pages = "184--203", + doi = "10.1007/978-3-032-07894-0_10", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:HWAG25, + author = "Martin Heckel and + Hannes Weissteiner and + Florian Adamsky and + Daniel Gruss", + title = "Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity", + pages = "204--223", + doi = "10.1007/978-3-032-07894-0_11", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:HYCLW25, + author = "Fugeng Huang and + Jiahong Yang and + Haibo Cheng and + Wenting Li and + Ping Wang", + title = "Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User", + pages = "224--242", + doi = "10.1007/978-3-032-07894-0_12", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:HSZCZY25, + author = "Hao Huang and + Xiuwei Shang and + Junqi Zhang and + Shaoyin Cheng and + Weiming Zhang and + Nenghai Yu", + title = "{WelkIR}: Flow-Sensitive Pre-trained Embeddings from Compiler {IR} for Vulnerability Detection", + pages = "243--262", + doi = "10.1007/978-3-032-07894-0_13", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:JLLCYZ25, + author = "Weihua Jiao and + Qingbao Li and + Xilong Li and + Zhifeng Chen and + Weiping Yao and + Guimin Zhang and + Fei Cao", + title = "Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces", + pages = "263--282", + doi = "10.1007/978-3-032-07894-0_14", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:KimJanShi25, + author = "Taehun Kim and + Hyerean Jang and + Youngjoo Shin", + title = "Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage", + pages = "283--302", + doi = "10.1007/978-3-032-07894-0_15", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:LRUM25, + author = "Lukas Lamster and + Fabian Rauscher and + Martin Unterguggenberger and + Stefan Mangard", + title = "{WaitWatcher} and {WaitGuard}: Detecting Flush-Based Cache Side-Channels Through Spurious Wakeups", + pages = "303--322", + doi = "10.1007/978-3-032-07894-0_16", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:LKSHS25, + author = "Woomin Lee and + Taehun Kim and + Seunghee Shin and + Junbeom Hur and + Youngjoo Shin", + title = "T-Time: {A} Fine-Grained Timing-Based Controlled-Channel Attack Against Intel {TDX}", + pages = "323--341", + doi = "10.1007/978-3-032-07894-0_17", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:LZZLG25, + author = "Baiyang Li and + Yujia Zhu and + Yuedong Zhang and + Qingyun Liu and + Li Guo", + title = "Unraveling {DoH} Traces: Padding-Resilient Website Fingerprinting via {HTTP}/2 Key Frame Sequences", + pages = "342--360", + doi = "10.1007/978-3-032-07894-0_18", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:MLZZ25, + author = "Lin Ma and + Xingwei Lin and + Ziming Zhang and + Yajin Zhou", + title = "{NLSaber}: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation", + pages = "361--381", + doi = "10.1007/978-3-032-07894-0_19", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:MKPCD25, + author = "Eduard Marin and + Jinwoo Kim and + Alessio Pavoni and + Mauro Conti and + Roberto {Di Pietro}", + title = "The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment", + pages = "382--401", + doi = "10.1007/978-3-032-07894-0_20", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:BKWJM25, + author = "Alireza Moghaddas Borhan and + Hugo Kermabon-Bobinnec and + Lingyu Wang and + Yosr Jarraya and + Suryadipta Majumdar", + title = "{CapMan}: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers", + pages = "402--422", + doi = "10.1007/978-3-032-07894-0_21", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:PALCR25, + author = "Javier Parada and + Cristina Alcaraz and + Javier L{\'o}pez and + Juan Caubet and + Rodrigo Rom{\'a}n", + title = "Digital Twin for Adaptive Adversary Emulation in {IIoT} Control Networks", + pages = "423--442", + doi = "10.1007/978-3-032-07894-0_22", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:JahAbdvan25, + author = "Ali Sadeghi Jahromi and + AbdelRahman Abdou and + Paul C. {van Oorschot}", + title = "Formal Security Analysis of {ss2DNS}", + pages = "443--463", + doi = "10.1007/978-3-032-07894-0_23", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:SXYHLC25, + author = "Wenju Sun and + Xi Xiao and + Qiben Yan and + Guangwu Hu and + Qing Li and + Chuan Chen", + title = "High-Efficiency Fuzzing Technique Using Hooked {I}/{O} System Calls for Targeted Input Analysis", + pages = "464--483", + doi = "10.1007/978-3-032-07894-0_24", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:TEKC25, + author = "Utku Tefek and + Ertem Esiner and + Felix Kottmann and + Deming Chen", + title = "{VeriFLo}: Verifiable Provenance with Fault Localization for Inter-domain Routing", + pages = "484--504", + doi = "10.1007/978-3-032-07894-0_25", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:VADRIK25, + author = "Antonino Vitale and + Simone Aonzo and + Savino Dambra and + Nanda Rani and + Lorenzo Ippolito and + Platon Kotzias and + Juan Caballero and + Davide Balzarotti", + title = "The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families", + pages = "505--525", + doi = "10.1007/978-3-032-07894-0_26", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:YWQZSC25, + author = "Jintong Yu and + Yuxuan Wang and + Shipei Qu and + Yubo Zhao and + Yipeng Shi and + Pei Cao and + Xiangjun Lu and + Chi Zhang and + Dawu Gu and + Cheng Hong", + title = "End-to-End Non-profiled Side-Channel Analysis on Long Raw Traces", + pages = "526--544", + doi = "10.1007/978-3-032-07894-0_27", + crossref = esorics25-3, +} + +@InProceedings{ESORICS:BHFKSM25, + author = "Mehrdad Bahrini and + Alexander Herbst and + Merle Freye and + Matthias Kohn and + Karsten Sohr and + Rainer Malaka", + title = "Transparency and Consent Challenges in {mHealth} Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns", + pages = "1--21", + doi = "10.1007/978-3-032-07901-5_1", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:BalKhoGur25, + author = "Berkay Kemal Balioglu and + Alireza Khodaie and + Mehmet Emre Gursoy", + title = "Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy", + pages = "22--42", + doi = "10.1007/978-3-032-07901-5_2", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:Bartolomeo25, + author = "Giovanni Bartolomeo", + title = "Functional Credentials: {A} Practical Construction for the European Digital Identity", + pages = "43--62", + doi = "10.1007/978-3-032-07901-5_3", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:CHWSLZ25, + author = "Jialin Chi and + Cheng Hong and + Axin Wu and + Tianqi Sun and + ZheChen Li and + Min Zhang and + Dengguo Feng", + title = "Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure", + pages = "63--85", + doi = "10.1007/978-3-032-07901-5_4", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:CorDebGau25, + author = "V{\'e}ronique Cortier and + Alexandre Debant and + Pierrick Gaudry", + title = "Breaking Verifiability and Vote Privacy in {CHVote}", + pages = "86--105", + doi = "10.1007/978-3-032-07901-5_5", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:GPFNGU25, + author = "Stefan Gast and + Nora Puntigam and + Simone Franza and + Sudheendra Raghav Neela and + Daniel Gruss and + Johanna Ullrich", + title = "Zero-Click {SnailLoad}: From Minimal to No User Interaction", + pages = "106--125", + doi = "10.1007/978-3-032-07901-5_6", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:GSBS25, + author = "Jiri Gavenda and + Petr Svenda and + Stanislav Bobon and + Vladimir Sedlacek", + title = "Analysis of Input-Output Mappings in Coinjoin Transactions with Arbitrary Values", + pages = "126--146", + doi = "10.1007/978-3-032-07901-5_7", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:GLMLSZ25, + author = "Bingyang Guo and + Mingxuan Liu and + Yihui Ma and + Ruixuan Li and + Fan Shi and + Min Zhang and + Baojun Liu and + Chengxi Xu and + Haixin Duan and + Geng Hong and + Min Yang and + Qingfeng Pan", + title = "Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible {HTML} Settings", + pages = "147--168", + doi = "10.1007/978-3-032-07901-5_8", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:HCRZ25, + author = "Howard Halim and + Eyasu Getahun Chekole and + Dani{\"e}l Reijsbergen and + Jianying Zhou", + title = "{BlowPrint}: Blow-Based Multi-factor Biometrics for Smartphone User Authentication", + pages = "169--189", + doi = "10.1007/978-3-032-07901-5_9", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:HXYLZZ25, + author = "Zhicheng Huang and + Fengyuan Xu and + Jiahong Yang and + Wenting Li and + Zonghua Zhang and + Chenbin Zhang and + Meng Ma and + Ping Wang", + title = "{GET}-{AID}: Graph-Enhanced Transformer for Provenance-Based Advanced Persistent Threats Investigation and Detection", + pages = "190--210", + doi = "10.1007/978-3-032-07901-5_10", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:KAPS25, + author = "Bhavani Kalal and + Abdulrahman Alhaidari and + Balaji Palanisamy and + Shamik Sural", + title = "The Economics of Deception: Structural Patterns of Rug Pull Across {DeFi} Blockchains", + pages = "211--232", + doi = "10.1007/978-3-032-07901-5_11", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:KDGT25, + author = "Youcef Korichi and + Jos{\'e}e Desharnais and + S{\'e}bastien Gambs and + Nadia Tawbi", + title = "Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning", + pages = "233--252", + doi = "10.1007/978-3-032-07901-5_12", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:LPOOPV25, + author = "Pascal Lafourcade and + Elsa L{\'o}pez P{\'e}rez and + Charles Olivier-Anclin and + Cristina Onete and + Cl{\'e}ment Papon and + Malisa Vucinic", + title = "Fine-Grained, Privacy-Augmenting {LI}-Compliance in the {LAKE} Standard", + pages = "253--273", + doi = "10.1007/978-3-032-07901-5_13", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:LaoImi25, + author = "Ala Eddine Laouir and + Abdessamad Imine", + title = "{RIPOST}: Two-Phase Private Decomposition for Multidimensional Data", + pages = "274--293", + doi = "10.1007/978-3-032-07901-5_14", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:NAIW25, + author = "Takumi Namiki and + Takumi Amada and + Mitsugu Iwamoto and + Yohei Watanabe", + title = "Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation", + pages = "294--313", + doi = "10.1007/978-3-032-07901-5_15", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:RDTZ25, + author = "Pengkun Ren and + Hai Dong and + Zahir Tari and + Pengcheng Zhang", + title = "Efficient and Secure Sleepy Model for {BFT} Consensus", + pages = "314--333", + doi = "10.1007/978-3-032-07901-5_16", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:RenAcaMye25, + author = "Silei Ren and + Cosku Acay and + Andrew C. Myers", + title = "An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference", + pages = "334--353", + doi = "10.1007/978-3-032-07901-5_17", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:SLYYD25, + author = "Jianfei Sun and + Yuxian Li and + Xuehuan Yang and + Guomin Yang and + Robert H. Deng", + title = "An Efficient Security-Enhanced Accountable Access Control for Named Data Networking", + pages = "354--373", + doi = "10.1007/978-3-032-07901-5_18", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:XZFJ25, + author = "Yansen Xin and + Rui Zhang and + Zhenglin Fan and + Ze Jia", + title = "Dobby: {A} Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies", + pages = "374--394", + doi = "10.1007/978-3-032-07901-5_19", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:ZNXYA25, + author = "Osama Zafar and + Mina Namazi and + Yuqiao Xu and + Youngjin Yoo and + Erman Ayday", + title = "A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization", + pages = "395--414", + doi = "10.1007/978-3-032-07901-5_20", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:ZLFJL25, + author = "Qingming Zeng and + Mo Li and + Ximing Fu and + Hui Jiang and + Chuanyi Liu", + title = "Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance", + pages = "415--432", + doi = "10.1007/978-3-032-07901-5_21", + crossref = esorics25-4, +} + +@InProceedings{ESORICS:ZenXieZha25, + author = "Wanying Zeng and + Lijia Xie and + Xiao Zhang", + title = "Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains", + pages = "433--451", + doi = "10.1007/978-3-032-07901-5_22", + crossref = esorics25-4, +} + @InProceedings{ESORICS:DDKYSA24, author = "Vasisht Duddu and Anudeep Das and @@ -322570,6 +325945,194 @@ @InProceedings{IMA:ButFar95 crossref = ima95, } +@InProceedings{INDOCRYPT:AriImr25, + author = "Mohammad Ferry Husnil Arif and + Muhammad Imran", + title = "On the Classical Hardness of the Semidirect Discrete Logarithm Problem in Finite Groups", + pages = "3--20", + doi = "10.1007/978-3-032-13301-4_1", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:KumSauKar25, + author = "Ruby Kumari and + Sumeet Saurav and + Abhijit Karmakar", + title = "High-Performance {FPGA} Implementation of a Recursive Modular Karatsuba Multiplier over {$GF(2^m)$}", + pages = "21--41", + doi = "10.1007/978-3-032-13301-4_2", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:PBMS25, + author = "Debranjan Pal and + Anubhab Baksi and + Surajit Mandal and + Santanu Sarkar", + title = "Improved Modeling for Substitution Boxes with Negative Samples and Beyond", + pages = "45--69", + doi = "10.1007/978-3-032-13301-4_3", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:OkaNagMiy25, + author = "Yurie Okada and + Atsuki Nagai and + Atsuko Miyaji", + title = "Refined Linear Approximations for {ARX} Ciphers and Their Application to {ChaCha}", + pages = "70--91", + doi = "10.1007/978-3-032-13301-4_4", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:KohNikSil25, + author = "Tohru Kohrita and + Maksim Nikolaev and + Javier Silva", + title = "{BOIL}: Proof-Carrying Data from Accumulation of Correlated Holographic {IOPs}", + pages = "95--118", + doi = "10.1007/978-3-032-13301-4_5", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:DouRou25, + author = "Antoine Douteau and + Adeline {Roux-Langlois}", + title = "Rejection-Free Framework of Zero-Knowledge Proof Based on Hint-{MLWE}", + pages = "119--144", + doi = "10.1007/978-3-032-13301-4_6", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:CHHTM25, + author = "Tao-Hsiang Chang and + Jen-Chieh Hsu and + Hao-Yi Hsu and + Raylin Tso and + Masahiro Mambo", + title = "{COMPASS}: {A} Compact {PASS}-Lineage Accumulator with Succinct Proofs", + pages = "145--169", + doi = "10.1007/978-3-032-13301-4_7", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:Berger25, + author = "Daniel Berger", + title = "Smooth Twins for Cryptographic Applications from Pell Equations", + pages = "173--193", + doi = "10.1007/978-3-032-13301-4_8", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:BanHelSal25, + author = "Gustavo Banegas and + Andreas Hellenbrand and + Matheus Saldanha", + title = "Hardened {CTIDH}: Dummy-Free and Deterministic {CTIDH}", + pages = "194--215", + doi = "10.1007/978-3-032-13301-4_9", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:GugRen25, + author = "Tobias Guggemos and + Farzin Renan", + title = "Key-Updatable Identity-Based Signature Schemes", + pages = "216--238", + doi = "10.1007/978-3-032-13301-4_10", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:KarKalSar25, + author = "Sudeshna Karmakar and + Abul Kalam and + Santanu Sarkar", + title = "Beyond Sequential Walks: Parallelizing the {GA}-Dlog Problem", + pages = "239--260", + doi = "10.1007/978-3-032-13301-4_11", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:PatVar25, + author = "Jacques Patarin and + Pierre Varjabedian", + title = "Multivariate Encryptions with {LL}' Perturbations - - Is it Possible to Repair {HFE} in Encryption?", + pages = "263--284", + doi = "10.1007/978-3-032-13301-4_12", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:BelShi25, + author = "Anushree Belel and + Junji Shikata", + title = "Efficient Identity-Based Inner Product Functional Encryption from {RLWE}", + pages = "285--311", + doi = "10.1007/978-3-032-13301-4_13", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:PurMis25, + author = "Komal Pursharthi and + Dheerendra Mishra", + title = "Module Lattice Based Constant-Size Group Signature with Verifier Local Revocation and Backward Unlinkability", + pages = "312--336", + doi = "10.1007/978-3-032-13301-4_14", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:WJBCLC25, + author = "Siyi Wang and + Kyungbae Jang and + Anubhab Baksi and + Sumanta Chakraborty and + Wei Jie Bryan Lee and + Anupam Chattopadhyay and + Hwajeong Seo", + title = "New Results in Quantum Analysis of {LED}: Featuring One and Two Oracle Attacks", + pages = "339--364", + doi = "10.1007/978-3-032-13301-4_15", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:SekNis25, + author = "Kyosuke Sekii and + Takashi Nishide", + title = "One-Time Memories Secure Against Depth-Bounded Quantum Circuits", + pages = "365--389", + doi = "10.1007/978-3-032-13301-4_16", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:DCGA25, + author = "Anisha Dutta and + Sayantan Chakraborty and + Chandan Goswami and + Avishek Adhikari", + title = "Practically Implementable Minimal Universal Gate Sets for Multi-qudit Systems with Cryptographic Validation", + pages = "390--414", + doi = "10.1007/978-3-032-13301-4_17", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:HKMP25, + author = "Rittwik Hajra and + Subha Kar and + Pratyay Mukherjee and + Soumit Pal", + title = "Traceable Bottom-Up Secret Sharing and Law and Order on Community Social Key Recovery", + pages = "417--441", + doi = "10.1007/978-3-032-13301-4_18", + crossref = indocrypt25, +} + +@InProceedings{INDOCRYPT:Sengupta25, + author = "Meghna Sengupta", + title = "Beyond Confidentiality: Framing-Resistant Secure Vault Schemes", + pages = "442--460", + doi = "10.1007/978-3-032-13301-4_19", + crossref = indocrypt25, +} + @InProceedings{INDOCRYPT:KRGGH24, author = "Vikas Kumar and Ali Raya and @@ -329466,6 +333029,310 @@ @InProceedings{INDOCRYPT:LKYL00 crossref = indocrypt00, } +@InProceedings{ISC:ZCSL25, + author = "Zhongxin Zhang and + Yincen Chen and + Ling Song and + Yin Lv", + title = "Improving the Differential-Linear Attack with Applications to {GIFT}-{COFB}, {GIFT}-64 and {HyENA}", + pages = "3--23", + doi = "10.1007/978-3-032-08124-7_1", + crossref = isc25, +} + +@InProceedings{ISC:LCHLL25, + author = "Senlin Liu and + Dongshu Cai and + Dongchi Han and + Hongbo Liu and + Xianhui Lu", + title = "Keyless Physical-Layer Cryptography", + pages = "24--44", + doi = "10.1007/978-3-032-08124-7_2", + crossref = isc25, +} + +@InProceedings{ISC:NaiSasSug25, + author = "Yusuke Naito and + Yu Sasaki and + Takeshi Sugawara", + title = "The Multi-user Security of {GCM}-{SST} and Further Enhancements", + pages = "45--65", + doi = "10.1007/978-3-032-08124-7_3", + crossref = isc25, +} + +@InProceedings{ISC:CheZen25, + author = "Jinghui Cheng and + Fanping Zeng", + title = "{SimSeq}: {A} Robust {TLS} Traffic Classification Method", + pages = "69--88", + doi = "10.1007/978-3-032-08124-7_4", + crossref = isc25, +} + +@InProceedings{ISC:WanYuYan25, + author = "Chengdong Wang and + Bo Yu and + Lin Yang", + title = "{EvoFuzz}: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory", + pages = "89--106", + doi = "10.1007/978-3-032-08124-7_5", + crossref = isc25, +} + +@InProceedings{ISC:HSAH25, + author = "Johanna Henrich and + Nicolai Schmitt and + Nouri Alnahawi and + Andreas Heinemann", + title = "A Lot of Data and Added Complexity. How Does {PQC} Affect the Performance of My {TLS} Connection?", + pages = "107--128", + doi = "10.1007/978-3-032-08124-7_6", + crossref = isc25, +} + +@InProceedings{ISC:YWWTYX25, + author = "Lisha Yao and + Jian Weng and + Pengfei Wu and + Guofeng Tang and + Guomin Yang and + Haiyang Xue and + Robert H. Deng", + title = "Conditional Attribute-Based {PRE}: Definition and Construction from {LWE}", + pages = "131--151", + doi = "10.1007/978-3-032-08124-7_7", + crossref = isc25, +} + +@InProceedings{ISC:JeoHaiTib25, + author = "Sohyun Jeon and + Calvin Abou Haidar and + Mehdi Tibouchi", + title = "{LastRings}: Lattice-Based Scalable Threshold Ring Signatures", + pages = "152--172", + doi = "10.1007/978-3-032-08124-7_8", + crossref = isc25, +} + +@InProceedings{ISC:SchZeiHei25, + author = "Nicolai Schmitt and + Jannik Zeitschner and + Andreas Heinemann", + title = "Simulation-Based Software Leakage Evaluation for the {RISC}-{V} Platform", + pages = "175--195", + doi = "10.1007/978-3-032-08124-7_9", + crossref = isc25, +} + +@InProceedings{ISC:MWXOS25, + author = "Hao Ma and + Zhidong Wang and + Da Xie and + Ciyan Ouyang and + Wei Song", + title = "{GIR}-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement", + pages = "196--215", + doi = "10.1007/978-3-032-08124-7_10", + crossref = isc25, +} + +@InProceedings{ISC:BelMarCon25, + author = "Anastasiia Belousova and + Francesco Marchiori and + Mauro Conti", + title = "Inference Attacks on Encrypted Online Voting via Traffic Analysis", + pages = "216--236", + doi = "10.1007/978-3-032-08124-7_11", + crossref = isc25, +} + +@InProceedings{ISC:LCJC25, + author = "Yinglong Li and + Bingyuan Chen and + Qingyan Jiang and + Tieming Chen", + title = "{MSPP}-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception", + pages = "239--257", + doi = "10.1007/978-3-032-08124-7_15", + crossref = isc25, +} + +@InProceedings{ISC:HuaZhuChe25, + author = "Xiaofei Huang and + Xiaojie Zhu and + Chi Chen", + title = "Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning", + pages = "258--278", + doi = "10.1007/978-3-032-08124-7_16", + crossref = isc25, +} + +@InProceedings{ISC:KhaIslHas25, + author = "Shahriar Rahman Khan and + Tariqul Islam and + Raiful Hasan", + title = "Spoofing Camera Source Attribution via {PRNU} Transfer Attacks on Physical and {AI} Generated Images", + pages = "279--299", + doi = "10.1007/978-3-032-08124-7_17", + crossref = isc25, +} + +@InProceedings{ISC:NSFT25, + author = "Wataru Nakamura and + Yusei Suzuki and + Masakazu Fujio and + Kenta Takahashi", + title = "Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures", + pages = "303--322", + doi = "10.1007/978-3-032-08124-7_18", + crossref = isc25, +} + +@InProceedings{ISC:MajBarBar25, + author = "Sara Majbour and + Morgan Barbier and + Jean-Marie Le Bars", + title = "A New Code-Based Formulation of the Fuzzy Vault Scheme", + pages = "323--344", + doi = "10.1007/978-3-032-08124-7_19", + crossref = isc25, +} + +@InProceedings{ISC:SSWXLZ25, + author = "Yanbing Shen and + Hao Sun and + Jiacheng Wang and + Haitao Xu and + Gang Liu and + Fan Zhang", + title = "{HoneySentry}: {A} High-Fidelity Interactive {IoT} Honeypot for Advanced Threat Detection", + pages = "347--366", + doi = "10.1007/978-3-032-08124-7_20", + crossref = isc25, +} + +@InProceedings{ISC:MHTTT25, + author = "Kensei Ma and + Chansu Han and + Akira Tanaka and + Takeshi Takahashi and + Jun'ichi Takeuchi", + title = "Towards Architecture-Independent Function Call Analysis for {IoT} Malware", + pages = "367--387", + doi = "10.1007/978-3-032-08124-7_21", + crossref = isc25, +} + +@InProceedings{ISC:NorEck25, + author = "Mohammad Reza Norouzian and + Claudia M. Eckert", + title = "{HGANN}-Mal: {A} Hypergraph Attention Neural Network Approach for Android Malware Detection", + pages = "388--408", + doi = "10.1007/978-3-032-08124-7_23", + crossref = isc25, +} + +@InProceedings{ISC:EFPEHM25, + author = "Magnus Wiik Eckhoff and + Peter Marius Flydal and + Siem Peters and + Martin Eian and + Jonas Halvorsen and + Vasileios Mavroeidis and + Gudmund Grov", + title = "A Graph-Based Approach to Alert Contextualisation in Security Operations Centres", + pages = "411--430", + doi = "10.1007/978-3-032-08124-7_24", + crossref = isc25, +} + +@InProceedings{ISC:HHTWP25, + author = "Lionel Hemmerl{\'e} and + Guillaume Hiet and + Fr{\'e}d{\'e}ric Tronel and + Pierre Wilke and + Jean-Christophe Pr{\'e}votet", + title = "{HYPERSEC}: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection", + pages = "431--451", + doi = "10.1007/978-3-032-08124-7_25", + crossref = isc25, +} + +@InProceedings{ISC:KLLSJ25, + author = "Jihoon Kwon and + Junho Lee and + Myeongyeol Lee and + Hyuna Seo and + Jinho Jung", + title = "{BootMarker}: {UEFI} Bootkit Defense via Control-Flow Verification", + pages = "452--473", + doi = "10.1007/978-3-032-08124-7_26", + crossref = isc25, +} + +@InProceedings{ISC:BWDLLJ25, + author = "Xinyu Bai and + Yisen Wang and + Jiajun Du and + Chen Liang and + Siyuan Liang and + Zirui Jiang", + title = "{Ali2Vul}: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment", + pages = "474--493", + doi = "10.1007/978-3-032-08124-7_27", + crossref = isc25, +} + +@InProceedings{ISC:DimAls25, + author = "Tassos Dimitriou and + Shahad Alshaher", + title = "{CryptNyx}: Password-Hardened Encryption with Strong Anonymity Guarantees", + pages = "497--517", + doi = "10.1007/978-3-032-08124-7_28", + crossref = isc25, +} + +@InProceedings{ISC:MohAlT25, + author = "Amin Mohammadali and + Riham AlTawy", + title = "Efficient Dynamic Group Signatures with Forward Security", + pages = "518--538", + doi = "10.1007/978-3-032-08124-7_29", + crossref = isc25, +} + +@InProceedings{ISC:VomFon25, + author = "Nikhill Vombatkere and + Philip W. L. Fong", + title = "Zero Trust Continuous Authentication Models and Automated Policy Formulation", + pages = "539--559", + doi = "10.1007/978-3-032-08124-7_30", + crossref = isc25, +} + +@InProceedings{ISC:NLZZC25, + author = "Zixuan Niu and + Xiaofeng Li and + He Zhao and + Tong Zhou and + Haotian Cheng", + title = "Jakiro: {A} Cross-Modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts", + pages = "563--580", + doi = "10.1007/978-3-032-08124-7_31", + crossref = isc25, +} + +@InProceedings{ISC:FenFan25, + author = "Chi Feng and + Lei Fan", + title = "{BlockLens}: Detecting Malicious Transactions in Ethereum Using {LLM} Techniques", + pages = "581--601", + doi = "10.1007/978-3-032-08124-7_32", + crossref = isc25, +} + @InProceedings{ISC:CLLZZW24, author = "Kundu Chen and Jie Luo and @@ -349318,6 +353185,283 @@ @InProceedings{ITCS:Hassidim10 crossref = itcs10, } +@InProceedings{IWSEC:Jia25, + author = "Dingding Jia", + title = "Dynamic Collusion Function-Private Functional Encryption", + pages = "3--23", + doi = "10.1007/978-981-95-4674-9_1", + crossref = iwsec25, +} + +@InProceedings{IWSEC:TezTan25a, + author = "Masayuki Tezuka and + Keisuke Tanaka", + title = "Public Key Encryption with Equality Test from Tag-Based Encryption", + pages = "24--44", + doi = "10.1007/978-981-95-4674-9_2", + crossref = iwsec25, +} + +@InProceedings{IWSEC:BerJoy25, + author = "Olivier Bernard and + Marc Joye", + title = "Approximate {CRT}-Based Gadget Decomposition for Fully Homomorphic Encryption", + pages = "45--64", + doi = "10.1007/978-981-95-4674-9_3", + crossref = iwsec25, +} + +@InProceedings{IWSEC:TezTan25b, + author = "Masayuki Tezuka and + Keisuke Tanaka", + title = "Ordered Multi-signatures with Public-Key Aggregation from {SXDH} Assumption", + pages = "67--87", + doi = "10.1007/978-981-95-4674-9_4", + crossref = iwsec25, +} + +@InProceedings{IWSEC:FHHY25, + author = "Yuuki Fujita and + Keisuke Hara and + Keitaro Hashimoto and + Kyosuke Yamashita", + title = "Multi-designated Verifier Ring Signature: Generic Construction from Standard Primitives", + pages = "88--107", + doi = "10.1007/978-981-95-4674-9_5", + crossref = iwsec25, +} + +@InProceedings{IWSEC:SFINU25, + author = "Toshihiro Suzuki and + Hiroki Furue and + Takuma Ito and + Shuhei Nakamura and + Shigenori Uchiyama", + title = "An Extended Rectangular {MinRank} Attack Against {UOV} and Its Variants", + pages = "111--130", + doi = "10.1007/978-981-95-4674-9_6", + crossref = iwsec25, +} + +@InProceedings{IWSEC:NOAF25, + author = "Shintaro Narisada and + Hiroki Okada and + Yusuke Aikawa and + Kazuhide Fukushima", + title = "Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding", + pages = "131--148", + doi = "10.1007/978-981-95-4674-9_7", + crossref = iwsec25, +} + +@InProceedings{IWSEC:CLPS25, + author = "Max Cartor and + Jacob Lichtinger and + Ray A. Perlner and + Daniel {Smith-Tone}", + title = "Practical Lattice Attack and Patched Parameters for {2F} Multivariate Encryption: Is {2F} Still Better Than Standard Lattice Constructions for Small Ciphertext Size?", + pages = "149--166", + doi = "10.1007/978-981-95-4674-9_8", + crossref = iwsec25, +} + +@InProceedings{IWSEC:SmiVal25, + author = "Daniel {Smith-Tone} and + Cristian Valenzuela", + title = "Cryptanalysis of the Best {HFE}-{LL}' Constructions", + pages = "167--186", + doi = "10.1007/978-981-95-4674-9_9", + crossref = iwsec25, +} + +@InProceedings{IWSEC:ITSN25, + author = "Shota Ikeda and + Yoshihiro Takahashi and + Kazumasa Shinagawa and + Koji Nuida", + title = "Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions", + pages = "189--209", + doi = "10.1007/978-981-95-4674-9_10", + crossref = iwsec25, +} + +@InProceedings{IWSEC:Iwasaki25, + author = "Atsushi Iwasaki", + title = "Minimum Number of up-down Cards for Finite-Time Committed-{AND} Protocol Without Interlocking Operations", + pages = "210--226", + doi = "10.1007/978-981-95-4674-9_11", + crossref = iwsec25, +} + +@InProceedings{IWSEC:Nuida25, + author = "Koji Nuida", + title = "Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction", + pages = "229--246", + doi = "10.1007/978-981-95-4674-9_12", + crossref = iwsec25, +} + +@InProceedings{IWSEC:AGDM25, + author = "Navid Abapour and + Amir Goharshady and + Catalin Dragan and + Mahdi Mahdavi", + title = "Blockchain-Based Economic Voting with Posterior Security from Lattices", + pages = "247--266", + doi = "10.1007/978-981-95-4674-9_13", + crossref = iwsec25, +} + +@InProceedings{IWSEC:ArmHenSch25, + author = "Frederik Armknecht and + Youzhe Heng and + Jochen Sch{\"a}fer", + title = "Non-interactive Privacy-Preserving Record Linkage Using Polynomial Sparsity Testing", + pages = "269--289", + doi = "10.1007/978-981-95-4674-9_14", + crossref = iwsec25, +} + +@InProceedings{IWSEC:IshTer25, + author = "Takumasa Ishioka and + Masayuki Terada", + title = "Utility of the Non-negative Wavelet Mechanism with Zero-Concentrated Differential Privacy", + pages = "290--306", + doi = "10.1007/978-981-95-4674-9_15", + crossref = iwsec25, +} + +@InProceedings{IWSEC:KarGur25, + author = "Yusuf Cemal Karatas and + M. Emre G{\"u}rsoy", + title = "Accelerating Simulations of Bitvector-Based {LDP} Protocols via Binomial Modeling", + pages = "307--325", + doi = "10.1007/978-981-95-4674-9_16", + crossref = iwsec25, +} + +@InProceedings{IWSEC:LeeChoNam25, + author = "Yonghwa Lee and + Wonseok Choi and + Donghyun Nam", + title = "Supply Chain Threats in the {MCP} Ecosystem: Attack Vectors and Mitigation Strategies", + pages = "329--349", + doi = "10.1007/978-981-95-4674-9_17", + crossref = iwsec25, +} + +@InProceedings{IWSEC:HasHidFuk25, + author = "Kento Hasegawa and + Seira Hidano and + Kazuhide Fukushima", + title = "Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models", + pages = "350--367", + doi = "10.1007/978-981-95-4674-9_18", + crossref = iwsec25, +} + +@InProceedings{IWSEC:KKBH25, + author = "Pandu Ranga Reddy Konala and + Vimal Kumar and + David Bainbridge and + Junaid Haseeb", + title = "Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata", + pages = "371--390", + doi = "10.1007/978-981-95-4674-9_19", + crossref = iwsec25, +} + +@InProceedings{IWSEC:KGMIKT25, + author = "Kentaro Kita and + Yuta Gempei and + Tomoaki Mimoto and + Takamasa Isohara and + Shinsaku Kiyomoto and + Toshiaki Tanaka", + title = "Detecting Fake Proof-of-Concept Codes on {GitHub} Using Static Code Analysis", + pages = "391--406", + doi = "10.1007/978-981-95-4674-9_20", + crossref = iwsec25, +} + +@InProceedings{IWSEC:MWXHS25, + author = "Hao Ma and + Zhidong Wang and + Da Xie and + Jinchi Han and + Wei Song", + title = "Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns", + pages = "409--428", + doi = "10.1007/978-981-95-4674-9_21", + crossref = iwsec25, +} + +@InProceedings{IWSEC:CMSS25, + author = "Tuo Chen and + Reoma Matsuo and + Ryota Shioya and + Kuniyasu Suzaki", + title = "Analyzing and Mitigating the {SSB} Vulnerability in an {MDP}-Equipped {RISC}-{V} Processor", + pages = "429--447", + doi = "10.1007/978-981-95-4674-9_22", + crossref = iwsec25, +} + +@InProceedings{IWSEC:SaiHasSuz25, + author = "Taishin Saito and + Masaki Hashimoto and + Kuniyasu Suzaki", + title = "Benign Activity Extraction for Dependency Reduction in Data Provenance-Based Attack Analysis", + pages = "451--467", + doi = "10.1007/978-981-95-4674-9_23", + crossref = iwsec25, +} + +@InProceedings{IWSEC:MKGIKT25, + author = "Tomoaki Mimoto and + Kentaro Kita and + Yuta Gempei and + Takamasa Isohara and + Shinsaku Kiyomoto and + Toshiaki Tanaka", + title = "Cyber Threat Intelligence Report Summarization with Named Entity Recognition", + pages = "468--485", + doi = "10.1007/978-981-95-4674-9_24", + crossref = iwsec25, +} + +@InProceedings{IWSEC:MMSA25, + author = "Christian M{\"u}ller and + Vasily Mikhalev and + Yves T. Staudenmaier and + Frederik Armknecht", + title = "One Antenna is Enough for Neutralizing Jamming in {IEEE} 802.15.4 {BPSK}", + pages = "489--509", + doi = "10.1007/978-981-95-4674-9_25", + crossref = iwsec25, +} + +@InProceedings{IWSEC:SuzIna25, + author = "Haruka Nakajima Suzuki and + Midori Inaba", + title = "Nudges to Reduce the Spread of Online Disinformation: {A} Comparison with the Educational Effect", + pages = "513--532", + doi = "10.1007/978-981-95-4674-9_26", + crossref = iwsec25, +} + +@InProceedings{IWSEC:ZIPKY25, + author = "Franziska Zimmer and + Mhd Irvan and + Maharage Nisansala Sevwandi Perera and + Ryosuke Kobayashi and + Rie Shigetomi Yamaguchi", + title = "Sequence Length Aggregation and Behavioral Biometrics: {A} Case Study in Professional Player Authentication via Tree-Based Classification", + pages = "533--551", + doi = "10.1007/978-981-95-4674-9_27", + crossref = iwsec25, +} + @InProceedings{IWSEC:ShiSakIso24, author = "Takuro Shiraya and Kosei Sakamoto and @@ -513042,6 +517186,718 @@ @InProceedings{STOC:Lloyd80 crossref = stoc80, } +@InProceedings{TCC:LiSon25, + author = "Junru Li and + Yifan Song", + title = "Honest Majority Constant-Round {MPC} with Linear Communication from One-Way Functions", + pages = "3--32", + doi = "10.1007/978-3-032-12287-2_1", + crossref = tcc25-1, +} + +@InProceedings{TCC:CFGPZ25, + author = "Ran Cohen and + Pouyan Forghani and + Juan Garay and + Rutvik Patel and + Vassilis Zikas", + title = "Is It Even Possible? {O}n the Parallel Composition of Asynchronous {MPC} Protocols", + pages = "33--63", + doi = "10.1007/978-3-032-12287-2_2", + crossref = tcc25-1, +} + +@InProceedings{TCC:LinLuZho25, + author = "Wei-Kai Lin and + Zhenghao Lu and + Hong-Sheng Zhou", + title = "Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption", + pages = "64--96", + doi = "10.1007/978-3-032-12287-2_3", + crossref = tcc25-1, +} + +@InProceedings{TCC:BraNew25, + author = "Mark Braverman and + Stephen Newman", + title = "Practical Secure Delegated Linear Algebra with Trapdoored Matrices", + pages = "97--118", + doi = "10.1007/978-3-032-12287-2_4", + crossref = tcc25-1, +} + +@InProceedings{TCC:AchHazVen25, + author = "Anasuya Acharya and + Carmit Hazay and + Muthuramakrishnan Venkitasubramaniam", + title = "On Achieving ``Best-in-the-Multiverse'' {MPC}", + pages = "119--151", + doi = "10.1007/978-3-032-12287-2_5", + crossref = tcc25-1, +} + +@InProceedings{TCC:CDRSY25, + author = "Michele Ciampi and + Ivan Damg{\r a}rd and + Divya Ravi and + Luisa Siniscalchi and + Sophia Yakoubov", + title = "Information-Theoretic Broadcast-Optimal {MPC}", + pages = "152--181", + doi = "10.1007/978-3-032-12287-2_6", + crossref = tcc25-1, +} + +@InProceedings{TCC:PeiPep25, + author = "Chris Peikert and + Zachary Pepin", + title = "Vive Galois! {P}art 1: Optimal {SIMD} Packing and Packed Bootstrapping for {FHE}", + pages = "185--219", + doi = "10.1007/978-3-032-12287-2_7", + crossref = tcc25-1, +} + +@InProceedings{TCC:BraMalMar25, + author = "Pedro Branco and + Giulio Malavolta and + Zayd Maradni", + title = "Fully-Homomorphic Encryption from Lattice Isomorphism", + pages = "220--252", + doi = "10.1007/978-3-032-12287-2_8", + crossref = tcc25-1, +} + +@InProceedings{TCC:DLLM25, + author = "Kuiyuan Duan and + Hongbo Li and + Dengfa Liu and + Guangsheng Ma", + title = "Large-Plaintext Functional Bootstrapping in {FHE} with Small Bootstrapping Keys", + pages = "253--279", + doi = "10.1007/978-3-032-12287-2_9", + crossref = tcc25-1, +} + +@InProceedings{TCC:AbrMalRoy25, + author = "Damiano Abram and + Giulio Malavolta and + Lawrence Roy", + title = "Slightly Sublinear Trapdoor Hash Functions and {PIR} from Low-Noise {LPN}", + pages = "280--300", + doi = "10.1007/978-3-032-12287-2_10", + crossref = tcc25-1, +} + +@InProceedings{TCC:BMORS25, + author = "Amik Raj Behera and + Pierre Meyer and + Claudio Orlandi and + Lawrence Roy and + Peter Scholl", + title = "Privately Constrained {PRFs} from {DCR}: Puncturing and Bounded Waring Rank", + pages = "301--332", + doi = "10.1007/978-3-032-12287-2_11", + crossref = tcc25-1, +} + +@InProceedings{TCC:AthRonRot25, + author = "Noor Athamnah and + Noga {Ron-Zewi} and + Ron D. Rothblum", + title = "Linear Prover {IOPs} in Log Star Rounds", + pages = "335--368", + doi = "10.1007/978-3-032-12287-2_12", + crossref = tcc25-1, +} + +@InProceedings{TCC:BCFW25, + author = "Benedikt B{\"u}nz and + Alessandro Chiesa and + Giacomo Fenzi and + William Wang", + title = "Linear-Time Accumulation Schemes", + pages = "369--399", + doi = "10.1007/978-3-032-12287-2_13", + crossref = tcc25-1, +} + +@InProceedings{TCC:BarChiGua25, + author = "Annalisa Barbara and + Alessandro Chiesa and + Ziyi Guan", + title = "Relativized Succinct Arguments in the {ROM} do not Exist", + pages = "400--416", + doi = "10.1007/978-3-032-12287-2_14", + crossref = tcc25-1, +} + +@InProceedings{TCC:BBGT25, + author = "Rishabh Bhadauria and + Alexander R. Block and + Prantar Ghosh and + Justin Thaler", + title = "{SNARK} Lower Bounds via Communication Complexity", + pages = "417--451", + doi = "10.1007/978-3-032-12287-2_15", + crossref = tcc25-1, +} + +@InProceedings{TCC:ChiOrr25, + author = "Alessandro Chiesa and + Michele Orr{\`u}", + title = "A Fiat-Shamir Transformation from Duplex Sponges", + pages = "452--474", + doi = "10.1007/978-3-032-12287-2_16", + crossref = tcc25-1, +} + +@InProceedings{TCC:GhoKomSeg25, + author = "Ashrujit Ghoshal and + Ilan Komargodski and + Gil Segev", + title = "Offline-Online Indifferentiability of Cryptographic Systems", + pages = "3--33", + doi = "10.1007/978-3-032-12293-3_1", + crossref = tcc25-2, +} + +@InProceedings{TCC:FreSilWic25, + author = "Cody Freitag and + Jad Silbak and + Daniel Wichs", + title = "Seedless Condensers for Efficiently Samplable Sources", + pages = "34--65", + doi = "10.1007/978-3-032-12293-3_2", + crossref = tcc25-2, +} + +@InProceedings{TCC:BenYog25, + author = "Shany Ben-David and + Eylon Yogev", + title = "Incompressible Encryption with Everlasting Security", + pages = "66--96", + doi = "10.1007/978-3-032-12293-3_3", + crossref = tcc25-2, +} + +@InProceedings{TCC:SOTTY25, + author = "Takumi Shinozaki and + Tatsuaki Okamoto and + Keisuke Tanaka and + Masayuki Tezuka and + Yusuke Yoshida", + title = "Relationships Among {FuncCPA} and Its Related Notions", + pages = "97--122", + doi = "10.1007/978-3-032-12293-3_4", + crossref = tcc25-2, +} + +@InProceedings{TCC:HeLiLin25, + author = "Jinye He and + Shiyu Li and + Wei-Kai Lin", + title = "Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives", + pages = "123--152", + doi = "10.1007/978-3-032-12293-3_5", + crossref = tcc25-2, +} + +@InProceedings{TCC:MazPasSol25, + author = "Noam Mazor and + Rafael Pass and + Tomer Solomon", + title = "A Meta-complexity Theoretic Approach to Indistinguishability Obfuscation and Witness Pseudo-Canonicalization", + pages = "153--187", + doi = "10.1007/978-3-032-12293-3_6", + crossref = tcc25-2, +} + +@InProceedings{TCC:BraJaiSri25, + author = "Pedro Branco and + Abhishek Jain and + Akshayaram Srinivasan", + title = "Obfuscating Pseudorandom Functions is Post-quantum Complete", + pages = "191--221", + doi = "10.1007/978-3-032-12293-3_7", + crossref = tcc25-2, +} + +@InProceedings{TCC:AgrKumYam25, + author = "Shweta Agrawal and + Simran Kumari and + Shota Yamada", + title = "Pseudorandom {FE}, {iO} and Applications", + pages = "222--258", + doi = "10.1007/978-3-032-12293-3_8", + crossref = tcc25-2, +} + +@InProceedings{TCC:AMYY25, + author = "Shweta Agrawal and + Anuja Modi and + Anshu Yadav and + Shota Yamada", + title = "Zeroizing Attacks Against Evasive and Circular Evasive {LWE}", + pages = "259--290", + doi = "10.1007/978-3-032-12293-3_9", + crossref = tcc25-2, +} + +@InProceedings{TCC:DGKS25a, + author = "Pratish Datta and + Jiaxin Guan and + Alexis Korb and + Amit Sahai", + title = "({M}ulti-input) {sfFE} for Randomized Functionalities, Revisited", + pages = "291--325", + doi = "10.1007/978-3-032-12293-3_10", + crossref = tcc25-2, +} + +@InProceedings{TCC:DGKS25b, + author = "Pratish Datta and + Jiaxin Guan and + Alexis Korb and + Amit Sahai", + title = "Adaptively Secure Streaming Functional Encryption", + pages = "326--361", + doi = "10.1007/978-3-032-12293-3_11", + crossref = tcc25-2, +} + +@InProceedings{TCC:AloBeiLas25, + author = "Bar Alon and + Amos Beimel and + Or Lasri", + title = "Simplified {PIR} and {CDS} Protocols and Improved Linear Secret-Sharing Schemes", + pages = "365--398", + doi = "10.1007/978-3-032-12293-3_12", + crossref = tcc25-2, +} + +@InProceedings{TCC:CDKRY25, + author = "Ran Canetti and + Ivan Damg{\r a}rd and + Sebastian Kolby and + Divya Ravi and + Sophia Yakoubov", + title = "Deniable Secret Sharing", + pages = "399--427", + doi = "10.1007/978-3-032-12293-3_13", + crossref = tcc25-2, +} + +@InProceedings{TCC:BeiFarMoy25, + author = "Amos Beimel and + Oriol Farr{\`a}s and + Adriana Moya", + title = "Polynomial Secret Sharing Schemes and Algebraic Matroids", + pages = "428--461", + doi = "10.1007/978-3-032-12293-3_14", + crossref = tcc25-2, +} + +@InProceedings{TCC:CDKS25, + author = "Geoffroy Couteau and + Srinivas Devadas and + Alexander Koch and + Sacha Servan-Schreiber", + title = "Pseudorandom Correlation Functions for Garbled Circuits", + pages = "462--497", + doi = "10.1007/978-3-032-12293-3_15", + crossref = tcc25-2, +} + +@InProceedings{TCC:CouKumYe25, + author = "Geoffroy Couteau and + Naman Kumar and + Xiaxi Ye", + title = "Multiparty Homomorphic Secret Sharing and More from {LPN} and {MQ}", + pages = "498--530", + doi = "10.1007/978-3-032-12293-3_16", + crossref = tcc25-2, +} + +@InProceedings{TCC:CKNY25, + author = "Jeffrey Champion and + Fuyuki Kitagawa and + Ryo Nishimaki and + Takashi Yamakawa", + title = "Untelegraphable Encryption and its Applications", + pages = "3--35", + doi = "10.1007/978-3-032-12296-4_1", + crossref = tcc25-3, +} + +@InProceedings{TCC:GMWZ25, + author = "Alex B. Grilo and + Giulio Malavolta and + Michael Walter and + Tianwei Zhang", + title = "Computational Monogamy of Entanglement and Non-interactive Quantum Key Distribution", + pages = "36--68", + doi = "10.1007/978-3-032-12296-4_2", + crossref = tcc25-3, +} + +@InProceedings{TCC:AnaGulLin25, + author = "Prabhanjan Ananth and + Aditya Gulati and + Yao-Ting Lin", + title = "On the Limitations of Pseudorandom Unitaries - Or: Cryptographic Applications of {LOCC} Indistinguishability of Identical Versus Independent Haar Unitaries", + pages = "69--103", + doi = "10.1007/978-3-032-12296-4_3", + crossref = tcc25-3, +} + +@InProceedings{TCC:Shalit25, + author = "Itay Shalit", + title = "Clifford Strategies in Interactive Protocols are Classically Simulatable", + pages = "104--133", + doi = "10.1007/978-3-032-12296-4_4", + crossref = tcc25-3, +} + +@InProceedings{TCC:HhaYam25, + author = "Minki Hhan and + Shogo Yamada", + title = "Pseudorandom Function-Like States from Common Haar Unitary", + pages = "134--165", + doi = "10.1007/978-3-032-12296-4_5", + crossref = tcc25-3, +} + +@InProceedings{TCC:KitYam25, + author = "Fuyuki Kitagawa and + Takashi Yamakawa", + title = "Foundations of Single-Decryptor Encryption", + pages = "166--197", + doi = "10.1007/978-3-032-12296-4_6", + crossref = tcc25-3, +} + +@InProceedings{TCC:ABHR25, + author = "Karen Azari and + Cecilia Boschini and + Kristina Host{\'a}kov{\'a} and + Michael Reichle", + title = "Security Amplification of Threshold Signatures in the Standard Model", + pages = "201--234", + doi = "10.1007/978-3-032-12296-4_7", + crossref = tcc25-3, +} + +@InProceedings{TCC:FehHuaKas25, + author = "Serge Fehr and + Yu-Hsuan Huang and + Julia Kastner", + title = "Sandwich {BUFF}: Achieving Non-resignability Using Iterative Hash Functions", + pages = "235--265", + doi = "10.1007/978-3-032-12296-4_8", + crossref = tcc25-3, +} + +@InProceedings{TCC:MerWes25, + author = "Arthur Herl{\'e}dan Le Merdy and + Benjamin Wesolowski", + title = "Unconditional Foundations for Supersingular Isogeny-Based Cryptography", + pages = "266--297", + doi = "10.1007/978-3-032-12296-4_9", + crossref = tcc25-3, +} + +@InProceedings{TCC:CorWu25, + author = "Henry {Corrigan-Gibbs} and + David J. Wu", + title = "The Pseudorandomness of Legendre Symbols Under the Quadratic-Residuosity Assumption", + pages = "298--322", + doi = "10.1007/978-3-032-12296-4_10", + crossref = tcc25-3, +} + +@InProceedings{TCC:JouLosSan25, + author = "Antoine Joux and + Julian Loss and + Giacomo Santato", + title = "Dimensional {esfROSion}: Improving the {sfROS} Attack with Decomposition in Higher Bases", + pages = "323--352", + doi = "10.1007/978-3-032-12296-4_11", + crossref = tcc25-3, +} + +@InProceedings{TCC:BraMal25, + author = "Pedro Branco and + Giulio Malavolta", + title = "Threshold Signatures from One-Way Functions", + pages = "353--374", + doi = "10.1007/978-3-032-12296-4_12", + crossref = tcc25-3, +} + +@InProceedings{TCC:MalMou25, + author = "Giulio Malavolta and + Tamer Mour", + title = "How to Verify that a Small Device is Quantum, Unconditionally", + pages = "377--408", + doi = "10.1007/978-3-032-12296-4_13", + crossref = tcc25-3, +} + +@InProceedings{TCC:SunVid25, + author = "Baocheng Sun and + Thomas Vidick", + title = "Quantum Interactive Oracle Proofs", + pages = "409--426", + doi = "10.1007/978-3-032-12296-4_14", + crossref = tcc25-3, +} + +@InProceedings{TCC:CGLS25, + author = "Alexandru Cojocaru and + Juan Garay and + Qipeng Liu and + Fang Song", + title = "{NISQ} Security and Complexity via Simple Classical Reasoning", + pages = "427--459", + doi = "10.1007/978-3-032-12296-4_15", + crossref = tcc25-3, +} + +@InProceedings{TCC:CDDGS25, + author = "Alessandro Chiesa and + Marcel Dall'Agnol and + Zijing Di and + Ziyi Guan and + Nicholas Spooner", + title = "Quantum Rewinding for {IOP}-Based Succinct Arguments", + pages = "460--479", + doi = "10.1007/978-3-032-12296-4_16", + crossref = tcc25-3, +} + +@InProceedings{TCC:Lipmaa25, + author = "Helger Lipmaa", + title = "Plonk is Simulation Extractable in {ROM} Under Falsifiable Assumptions", + pages = "3--36", + doi = "10.1007/978-3-032-12290-2_1", + crossref = tcc25-4, +} + +@InProceedings{TCC:BCFFMM25, + author = "Anubhav Baweja and + Alessandro Chiesa and + Elisabetta Fedele and + Giacomo Fenzi and + Pratyush Mishra and + Tushar Mopuri and + Andrew Zitek-Estrada", + title = "Time-Space Trade-Offs for Sumcheck", + pages = "37--70", + doi = "10.1007/978-3-032-12290-2_2", + crossref = tcc25-4, +} + +@InProceedings{TCC:BLNWW25, + author = "Eli Bradley and + George Lu and + Shafik Nassar and + Brent Waters and + David J. Wu", + title = "A Hidden-Bits Approach to Statistical {ZAPs} from {LWE}", + pages = "71--104", + doi = "10.1007/978-3-032-12290-2_3", + crossref = tcc25-4, +} + +@InProceedings{TCC:Yang25, + author = "Yibin Yang", + title = "{Justvengers}: Batched {VOLE} {ZK} Disjunctions in {$\mathcal{O}(R+B+C)$} Communication", + pages = "105--137", + doi = "10.1007/978-3-032-12290-2_4", + crossref = tcc25-4, +} + +@InProceedings{TCC:Kiyoshima25, + author = "Susumu Kiyoshima", + title = "Four-Round Statistical Non-malleable Zero-Knowledge", + pages = "138--170", + doi = "10.1007/978-3-032-12290-2_5", + crossref = tcc25-4, +} + +@InProceedings{TCC:DujGunPie25, + author = "Jesko Dujmovic and + Christoph U. G{\"u}nther and + Krzysztof Pietrzak", + title = "Space-Deniable Proofs", + pages = "171--202", + doi = "10.1007/978-3-032-12290-2_6", + crossref = tcc25-4, +} + +@InProceedings{TCC:GarGunWan25, + author = "Sanjam Garg and + Sam Gunn and + Mingyuan Wang", + title = "Black-Box Crypto Is Useless for Pseudorandom Codes", + pages = "205--224", + doi = "10.1007/978-3-032-12290-2_7", + crossref = tcc25-4, +} + +@InProceedings{TCC:DotMulRaj25, + author = "Nico D{\"o}ttling and + Anne M{\"u}ller and + Mahesh Sreekumar Rajasree", + title = "Separating Pseudorandom Codes from Local Oracles", + pages = "225--257", + doi = "10.1007/978-3-032-12290-2_8", + crossref = tcc25-4, +} + +@InProceedings{TCC:HuVad25, + author = "Lunjia Hu and + Salil P. Vadhan", + title = "Generalized and Unified Equivalences Between Hardness and Pseudoentropy", + pages = "258--288", + doi = "10.1007/978-3-032-12290-2_9", + crossref = tcc25-4, +} + +@InProceedings{TCC:Mureau25, + author = "Guilhem Mureau", + title = "Special Genera of Hermitian Lattices and Applications to {HAWK}", + pages = "289--317", + doi = "10.1007/978-3-032-12290-2_10", + crossref = tcc25-4, +} + +@InProceedings{TCC:DwoTanZha25, + author = "Cynthia Dwork and + Pranay Tankala and + Linjun Zhang", + title = "Differentially Private Learning Beyond the Classical Dimensionality Regime", + pages = "321--355", + doi = "10.1007/978-3-032-12290-2_11", + crossref = tcc25-4, +} + +@InProceedings{TCC:BloLeeGar25, + author = "Jeremiah Blocki and + Seunghoon Lee and + Brayan Sebasti{\'a}n Yepes Garcia", + title = "Differentially Private Compression and the Sensitivity of {LZ77}", + pages = "356--386", + doi = "10.1007/978-3-032-12290-2_12", + crossref = tcc25-4, +} + +@InProceedings{TCC:RatVad25, + author = "Zachary Ratliff and + Salil P. Vadhan", + title = "Securing Unbounded Differential Privacy Against Timing Attacks", + pages = "387--414", + doi = "10.1007/978-3-032-12290-2_13", + crossref = tcc25-4, +} + +@InProceedings{TCC:BIKL25, + author = "Amos Beimel and + Yuval Ishai and + Eyal Kushilevitz and + Hanjun Li", + title = "Cryptography with Weak Privacy", + pages = "415--447", + doi = "10.1007/978-3-032-12290-2_14", + crossref = tcc25-4, +} + +@InProceedings{TCC:LarSim25, + author = "Kasper Green Larsen and + Mark Simkin", + title = "Time/Space Tradeoffs for Generic Attacks on Delay Functions", + pages = "451--477", + doi = "10.1007/978-3-032-12290-2_15", + crossref = tcc25-4, +} + +@InProceedings{TCC:BNGUW25, + author = "Nicholas Brandt and + Miguel Cueto Noval and + Christoph U. G{\"u}nther and + Akin {\"U}nal and + Stella Wohnig", + title = "Constrained Verifiable Random Functions Without Obfuscation and Friends", + pages = "478--511", + doi = "10.1007/978-3-032-12290-2_16", + crossref = tcc25-4, +} + +@InProceedings{TCC:BloSme25, + author = "Jeremiah Blocki and + Nathan Smearsoll", + title = "Provably Memory-Hard Proofs of Work with Memory-Easy Verification", + pages = "512--544", + doi = "10.1007/978-3-032-12290-2_17", + crossref = tcc25-4, +} + +@InProceedings{TCC:AFOS25, + author = "Damiano Abram and + Serge Fehr and + Maciej Obremski and + Peter Scholl", + title = "On the Impossibility of Actively Secure Distributed Samplers", + pages = "547--581", + doi = "10.1007/978-3-032-12290-2_18", + crossref = tcc25-4, +} + +@InProceedings{TCC:GLMDS25, + author = "Ashrujit Ghoshal and + Baitian Li and + Yaohua Ma and + Chenxin Dai and + Elaine Shi", + title = "Scalable Multi-server Private Information Retrieval", + pages = "582--610", + doi = "10.1007/978-3-032-12290-2_19", + crossref = tcc25-4, +} + +@InProceedings{TCC:LLFMP25, + author = "Arthur Lazzaretti and + Zeyu Liu and + Ben Fisch and + Peihan Miao and + Charalampos Papamanthou", + title = "Multi-server Doubly Efficient {PIR} in the Classical Model and Beyond", + pages = "611--641", + doi = "10.1007/978-3-032-12290-2_20", + crossref = tcc25-4, +} + +@InProceedings{TCC:CanChe25, + author = "Ran Canetti and + Megan Chen", + title = "Universally Composable Succinct Vector Commitments and Applications", + pages = "642--674", + doi = "10.1007/978-3-032-12290-2_21", + crossref = tcc25-4, +} + +@InProceedings{TCC:CDLLR25, + author = "Ran Cohen and + Jack Doerner and + Eysa Lee and + Anna Lysyanskaya and + Lawrence Roy", + title = "An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast", + pages = "675--708", + doi = "10.1007/978-3-032-12290-2_22", + crossref = tcc25-4, +} + @InProceedings{TCC:MuVas24, author = "Changrui Mu and Prashant Nalini Vasudevan",