中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security - ESORICS 2025
会议名
30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名
《第三十届欧洲计算机安全研究专题研讨会,卷2》
会议日期
September 22-24, 2025
会议地点
Toulouse, France
出版年
2026
馆藏号
359412
题名
作者
出版年
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts
Masayuki Abe; Masaya Nanri; Miyako Ohkubo; Octavio Perez-Kempner; Daniel Slamanig; Mehdi Tibouchi
2026
Tetris! Traceable Extendable Threshold Ring Signatures and More
Gennaro Avitabile; Vincenzo Botta; Dario Fiore
2026
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing
Joonsang Baek; Seongbong Choi; Willy Susilo; Partha Sarathi Roy; Hyung Tae Lee
2026
Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries
Bingxue Bian; Qiaoer Xu; Jiatao Liu; Jianfeng Wang
2026
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies
Theophile Brezot; Chloe Hebant; Paola de Perthuis; David Pointcheval
2026
Anamorphic Monero Transactions: The Threat of Bypassing Anti-money Laundering Laws
Adrian Cinal; Przemyslaw Kubiak; Miroslaw Kutylowski; Gabriel Wechta
2026
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation
Aditya Damodaran; Simon Rastikian; Peter B. Ronne; Peter Y. A. Ryan
2026
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-quantum Assumptions
Qijia Fan; Chenhao Bao; Xuanyu Shi; Shuai Han; Shengli Liu
2026
Concretely Efficient Parallel-Accessible DORAM for 100K-Sized Array
Koki Hamada
2026
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA
Arturo Hernandez-Sanchez; Santiago Escobar
2026
A Post-quantum Distributed OPRF from the Legendre PRF
Novak Kaluderovic; Nan Cheng; Aikaterini Mitrokotsa
2026
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications
Chandan Kumar; Nimish Mishra; Suvradip Chakraborty; Satrajit Ghosh; Debdeep Mukhopadhyay
2026
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme
Remma Kumazaki; Yuichi Kaji
2026
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices
Qinyi Li; Xavier Boyen
2026
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller
Chongyu Long; Yuewu Wang; Lingguang Lei; Haoyang Xing; Jiwu Jing
2026
Formalisation of the KZG Polynomial Commitment Schemes in EasyCrypt
Palak; Thomas Haines
2026
UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption
Jaehwan Park; Hyeonbum Lee; Junbeom Hur; Jae Hong Seo; Doowon Kim
2026
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization
Yan Shao; Yuejun Liu; Yongbin Zhou; Mingyao Shao
2026
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Martin Unterguggenberger; Lukas Lamster; Mathias Oberhuber; Simon Scherer; Stefan Mangard
2026
Optimized Privacy-Preserving Multi-signatures from Discrete Logarithm Assumption
Xiaoyang Wei; Shuai Han; Shengli Liu
2026
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2026