


default search action
34th CSF 2021: Dubrovnik, Croatia
- 34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021. IEEE 2021, ISBN 978-1-7281-7607-9
- Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi:
Yes We can: Watermarking Machine Learning Models beyond Classification. 1-14 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Simone Tini:
Formal Impact Metrics for Cyber-physical Attacks. 1-16 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
:
KACHINA - Foundations of Private Smart Contracts. 1-16 - François Dupressoir, Sara Zain:
Machine-Checking Unforgeability Proofs for Signature Schemes with Tight Reductions to the Computational Diffie-Hellman Problem. 1-15 - Akram El-Korashy, Stelios Tsampas
, Marco Patrignani
, Dominique Devriese
, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. 1-16 - Massimo Bartoletti, Stefano Lande, Roberto Zunino
:
Computationally sound Bitcoin tokens. 1-15 - Yu Wang
, Siddhartha Nalluri, Borzoo Bonakdarpour, Miroslav Pajic:
Statistical Model Checking for Hyperproperties. 1-16 - Ioanna Karantaidou, Foteini Baldimtsi:
Efficient Constructions of Pairing Based Accumulators. 1-16 - Carlos E. Budde
, Mariëlle Stoelinga
:
Efficient Algorithms for Quantitative Attack Tree Analysis. 1-15 - Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss
, Hendrik Waldner:
Consistency for Functional Encryption. 1-16 - Leslie Lamport, Fred B. Schneider:
Verifying Hyperproperties With TLA. 1-16 - Chike Abuah, Alex Silence, David Darais, Joseph P. Near:
DDUO: General-Purpose Dynamic Analysis for Differential Privacy. 1-15 - Nikolaj Sidorenco, Sabine Oechsner
, Bas Spitters
:
Formal security analysis of MPC-in-the-head zero-knowledge protocols. 1-14 - Sebastian Hunt
, David Sands:
A Quantale of Information. 1-15 - Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. 1-17 - David A. Basin, Andreas Lochbihler, Ueli Maurer, S. Reza Sefidgar:
Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL. 1-16 - Ioana Boureanu, Constantin Catalin Dragan
, François Dupressoir, David Gérault, Pascal Lafourcade:
Mechanised Models and Proofs for Distance-Bounding. 1-16 - Arthur Américo, Pasquale Malacaria:
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures. 1-14 - Jeppe Fredsgaard Blaabjerg, Aslan Askarov:
Towards Language-Based Mitigation of Traffic Analysis Attacks. 1-15 - Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. 1-16 - Andreas V. Hess, Sebastian Mödersheim
, Achim D. Brucker, Anders Schlichtkrull
:
Performing Security Proofs of Stateful Protocols. 1-16 - Kirsten Winter, Nicholas Coughlin
, Graeme Smith
:
Backwards-directed information flow analysis for concurrent programs. 1-16 - Christoph Baumann, Mads Dam, Roberto Guanciale, Hamed Nemati
:
On Compositional Information Flow Aware Refinement. 1-16 - Abhishek Bichhawat, McKenna McCall, Limin Jia
:
Gradual Security Types and Gradual Guarantees. 1-16 - Jian Xiang, Nathan Fulton, Stephen Chong:
Relational Analysis of Sensor Attacks on Cyber-Physical Systems. 1-16 - Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. 1-16 - Denis Firsov, Henri Lakk, Ahto Truu:
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping. 1-13 - Ankush Das
, Stephanie Balzer, Jan Hoffmann, Frank Pfenning, Ishani Santurkar:
Resource-Aware Session Types for Digital Contracts. 1-16 - Sébastien Gondron, Sebastian Mödersheim
:
Vertical Composition and Sound Payload Abstraction for Stateful Protocols. 1-16 - Aditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi
:
Language Support for Secure Software Development with Enclaves. 1-16 - Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk:
A Coq proof of the correctness of X25519 in TweetNaCl. 1-16 - Alexander Dax, Robert Künnemann:
On the Soundness of Infrastructure Adversaries. 1-16 - Abhishek Bichhawat, Matt Fredrikson
, Jean Yang:
Automating Audit with Policy Inference. 1-16 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases. 1-16 - Kevin Morio
, Robert Künnemann:
Verifying Accountability for Unbounded Sets of Participants. 1-16 - Mireya Jurado
, Catuscia Palamidessi, Geoffrey Smith:
A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption. 1-16 - Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, Hideaki Sone:
Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags. 1-16 - Sevdenur Baloglu
, Sergiu Bursuc
, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. 1-15 - Søren Eller Thomsen
, Bas Spitters
:
Formalizing Nakamoto-Style Proof of Stake. 1-15 - Carmine Abate, Philipp G. Haselwarter
, Exequiel Rivas
, Antoine Van Muylder
, Théo Winterhalter, Catalin Hritcu, Kenji Maillard, Bas Spitters
:
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. 1-15 - Maximilian Algehed, Jean-Philippe Bernardy, Catalin Hritcu:
Dynamic IFC Theorems for Free! 1-14 - Tobias Klenze, Christoph Sprenger
, David A. Basin:
Formal Verification of Secure Forwarding Protocols. 1-16 - Gilles Barthe, Sandrine Blazy
, Rémi Hutin, David Pichardie:
Secure Compilation of Constant-Resource Programs. 1-12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.