中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2025
会议名30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名《第三十届欧洲计算机安全研究专题研讨会,卷2》
会议日期September 22-24, 2025
会议地点Toulouse, France
出版年2026
馆藏号359412


题名作者出版年
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable CiphertextsMasayuki Abe; Masaya Nanri; Miyako Ohkubo; Octavio Perez-Kempner; Daniel Slamanig; Mehdi Tibouchi2026
Tetris! Traceable Extendable Threshold Ring Signatures and MoreGennaro Avitabile; Vincenzo Botta; Dario Fiore2026
Efficient One-Pass Private Set Intersection from Pairings with Offline PreprocessingJoonsang Baek; Seongbong Choi; Willy Susilo; Partha Sarathi Roy; Hyung Tae Lee2026
Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive QueriesBingxue Bian; Qiaoer Xu; Jiatao Liu; Jianfeng Wang2026
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access PoliciesTheophile Brezot; Chloe Hebant; Paola de Perthuis; David Pointcheval2026
Anamorphic Monero Transactions: The Threat of Bypassing Anti-money Laundering LawsAdrian Cinal; Przemyslaw Kubiak; Miroslaw Kutylowski; Gabriel Wechta2026
Hyperion: Transparent End-to-End Verifiable Voting with Coercion MitigationAditya Damodaran; Simon Rastikian; Peter B. Ronne; Peter Y. A. Ryan2026
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-quantum AssumptionsQijia Fan; Chenhao Bao; Xuanyu Shi; Shuai Han; Shengli Liu2026
Concretely Efficient Parallel-Accessible DORAM for 100K-Sized ArrayKoki Hamada2026
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPAArturo Hernandez-Sanchez; Santiago Escobar2026
A Post-quantum Distributed OPRF from the Legendre PRFNovak Kaluderovic; Nan Cheng; Aikaterini Mitrokotsa2026
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic ApplicationsChandan Kumar; Nimish Mishra; Suvradip Chakraborty; Satrajit Ghosh; Debdeep Mukhopadhyay2026
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking SchemeRemma Kumazaki; Yuichi Kaji2026
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from LatticesQinyi Li; Xavier Boyen2026
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge ControllerChongyu Long; Yuewu Wang; Lingguang Lei; Haoyang Xing; Jiwu Jing2026
Formalisation of the KZG Polynomial Commitment Schemes in EasyCryptPalak; Thomas Haines2026
UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing EncryptionJaehwan Park; Hyeonbum Lee; Junbeom Hur; Jae Hong Seo; Doowon Kim2026
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext GeneralizationYan Shao; Yuejun Liu; Yongbin Zhou; Mingyao Shao2026
Code Encryption with Intel TME-MK for Control-Flow EnforcementMartin Unterguggenberger; Lukas Lamster; Mathias Oberhuber; Simon Scherer; Stefan Mangard2026
Optimized Privacy-Preserving Multi-signatures from Discrete Logarithm AssumptionXiaoyang Wei; Shuai Han; Shengli Liu2026
12