ACISP 2017

22nd Australasian Conference on Information Security and Privacy
Auckland, New Zealand, 3-5 July 2017

Held in conjunction with ATIS 2017 on 6-7 July, 2017

Conference Schedule

ACISP 2017 Schedule
Monday 3 July 2017 Tuesday 4 July 2017 Wednesday 5 July 2017
Registration
08:00 – 17:10
Registration
08:30 – 17:15
Registration
08:30 – 16:30
Powhiri welcome
08:30 – 09:30

Keynote Speech 1:

Prof. L. Jean Camp (IU, USA)
09:00 – 10:00

Keynote Speech 2:

Peter Pilley (DIA, NZ)
09:00 - 10:00

Jennifer Seberry Lecture:

Prof. Clark Thomborson
09:30 – 10:30

Regular papers – Session 4A + 4B

10:00 – 11:15

Regular papers – Session 7A + 7B

10:00 – 11:15

Coffee Break (10:30 – 10:50)

Coffee Break (11:15 – 11:40)

Coffee Break (11:15 – 11:40)

Regular papers – Session 1A + 1B
10:50 – 12:30
Invited Talk 2:
A/Prof Ian Welch (VUW, NZ)
11:40 – 12:20
Invited Talk 5:
Dr Dongxi Liu (CSIRO, AU)
11:40 – 12:20

Lunch (12:30 – 13:20)

Invited Talk 1:
A/Prof Henry B Wolfe (Otago, NZ)
13:20 – 14:00
Invited Talk 3:
Dr Surya Nepal (CSIRO, AU)
13:20 – 14:00
Invited Talk 6:
Prof. Paul S. Pang (UniTec, NZ)
13:20 – 14:00

Regular papers – Session 2A + 2B
14:00 – 15:15

Invited Talk 4:
Dr Dong Seong Kim (UC, NZ)
14:00 – 14:40
Regular papers – Session 8A + 8B
14:00 – 14:50
Coffee Break (15:15 – 15:40) Coffee Break (14:40 – 15:00)  Coffee Break (14:50 – 15:15)
Regular papers - Session 3A+ 3B
15:40 – 16:30
Regular papers – Session 5A + 5B
15:00 – 16:15
Regular papers – Session 9A
15:15 – 16:30
Short papers – Session 3A
15:15 – 16:30
Short papers – Session 1A + 1B
16:30 – 17:00

Regular papers – Session 6A

16:15 – 17:05

Short papers – Session 2A + 2B

16:15 – 17:10

Steering Committee Meeting
17:00 – 17:30
Welcome Reception
(featuring Pacific Cultural Performance)
17:30
Maori Haka Cultural Performance
17:30 – 18:00

Conference Closing
16:30

  Conference dinner
18:30
*note that a shuttle service will be provided from Massy to the dinner venue from 6pm after haka performance
 

Technical Program

Conference Opening
08:30 – 09:30 (3 July)

Powhiri Welcome Plan

• Chairs set up facing the auditorium for the tangata whenua and Massey hosts, including Waiata Group.
• Rita to brief the manuhiri (visitors) in the SNW foyer before she calls them into SNW 200.
• Usher the visitors in to fill up all the front seats, with 1-2 male speakers to respond on behalf of the visiting group, in front row.
• Haahi opens the proceedings with prayer and everyone stands to sing ‘He Honore’ (words on screen).
• Everyone sits, and Haahi continues his mihimihi of welcome.
• When he has finished, the Massey host side stands to sing in support of his words.
• Haahi sits, and another speaker from Massey may offer some words of welcome to the visitors.
• Again, Massey sings in support.
• Haahi offers the visitors an explanation for what is taking place, and gives the visitors the opportunity to respond.
• One of the visitors stands and replies to the words of welcome, in whatever language he is comfortable, on behalf of the group.
• They may like to sing something in support of his words. We can have the words to ‘Te Aroha’ on the screen if wanted.
• Other speakers can have the opportunity to speak too.
• Once they have finished, Haahi will then explain the next steps, the hongi, followed by a shared morning tea, to bring everyone together, and mention the time to return to the auditorium for the conference proceedings.
• The first row of men should file across to Haahi, and do the hongi, then move down the front line of the host group.
• Once these formalities have taken place, everyone is free to move into the foyer for morning tea.

Please see the brief introduction to welcome ceremonies in Māori in this document.
(INFORMATION ABOUT WELCOME CEREMONIES IN MᾹORI.pdf).

Jennifer Seberry Invited Lecture
09:30 – 10:30 (3 July)

Contextual Privacy
Prof. Clark Thomborson
Session Chair: Josef Pieprzyk

Regular Papers
10:50 – 12:30 (3 July)

Regular Papers – Session 1A: Searchable Encryption
Session Chair: Marc Fischlin

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage

Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin

Multi-user Cloud-based Secure Keyword Search

Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld

Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing

Hong Zhu, Zhuolin Mei, Bing Wu, Hongbo Li and Zongmin Cui

Secure and Practical Searchable Encryption: A Position Paper

Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello


Regular Papers – Session 1B: Public Key Encryption
Session Chair: Dipanwita Roy Chowdhury

Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency

Puwen Wei, Wei Wang, Bingxin Zhu and Siu Ming Yiu

Hierarchical Functional Encryption for Linear Transformations

Shiwei Zhang, Yi Mu, Guomin Yang and Xiaofen Wang

KDM-Secure Public-Key Encryption from Constant-Noise LPN

Shuai Han and Shengli Liu

Long-Term Secure Commitments via Extractable-Binding Commitments

Ahto Buldas, Matthias Geihs and Johannes Buchmann

Invited Talk 1:
13:20 – 14:00 (3 July)

Mobile Phone and General ICT Security Issues
Associate Prof. Henry B. Wolfe (Otago, NZ)
Session Chair: Suriadi Suriadi

Regular papers - Session 2A+ 2B
14:00 – 15:15 (3 July)

Regular Papers – Session 2A: Attribute-based Encryption
Session Chair: Willy Susilo

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption

Katsuyuki Takashima

Attribute-Based Encryption with Expressive and Authorized Keyword Search

Hui Cui, Robert H. Deng, Joseph K. Liu and Yingjiu Li

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud

Yanjiang Yang, Joseph Liu, Zhuo Wei and Xinyi Huang


Regular Papers – Session 2B: Software Security
Session Chair: Ron Steinfeld

FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability

Fan Jiang, Cen Zhang and Shaoyin Cheng

Splitting Third-party Libraries Privileges from Android Apps

Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang and Yingjiao Niu

PriMal: Cloud-based Privacy-preserving Malware Detection

Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu1 and Qiaolin Hu

Regular papers - Session 3A+ 3B
15:40 – 16:30 (3 July)

Regular Papers – Session 3A: Digital Signature
Session Chair: Joseph Liu

Exploring Effect of Location Number on Map-Based Graphical Password Authentication

Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption

Xiao Zhang, Shengli Liu and Dawu Gu


Regular Papers – Session 3B: Cryptanalysis I
Session Chair: Deukjo Hong

Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes

Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, and Kenneth

Koon-Ho Wong

How to Handle Rainbow Tables with External Memory

Gildas Avoine, Xavier Carpent, Barbara Kordy and Florent Tardif

Short papers – Session 1A + 1B
16:30 – 17:00 (3 July)

Short Papers – Session 1A
Session Chair: Leonie Simpson

Certificate Transparency with Enhancements and Short Proofs

Abhishek Singh, Binanda Sengupta2 and Sushmita Ruj

Update-tolerant and Revocable Password Backup

Moritz Horsch, Johannes Braun, Dominique Metz and Johannes Buchmann


Short Papers – Session 1B
Session Chair: Xinyi Huang

Redactable Graph Hashing, Revisited

Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kbler, Michael Kmmerlin, Jakob Laenge and Felix Rohrbach

On the Security of Designing A Cellular Automata Based Stream Cipher

Swapan Maiti, Shamit Ghosh and Dipanwita Roy Chowdhury

Keynote Speech 1:
09:00 – 10:00 (4 July)

Security as Risk Communication
Prof. L. Jean Camp (IU, USA)
Session Chair: Paul Watters

Regular papers – Session 4A + 4B
10:00 – 11:15 (4 July)

Regular Papers – Session 4A: Cryptanalysis II
Session Chair: Robert Deng

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Mengce Zheng, Noboru Kunihiro and Honggang Hu

Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE

Suvradip Chakraborty, Goutam Paul and C. Pandu Rangan

Analysis of Toeplitz MDS Matrices

Sumanta Sarkar and Habeeb Syed


Regular Papers – Session 4B: Symmetric Cryptography
Session Chair: Jean-Guillaume Dumas

Improved Integral Attack on HIGHT

Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii

Reforgeability of Authenticated Encryption Schemes

Christian Forler, Eik List, Stefan Lucks and Jakob Wenzel

Indifferentiability of Double-Block-Length Hash Function without Feed-Forward Operations

Yusuke Naito

Invited Talk 2:
11:40 – 12:20 (4 July)

Software Defined Networking as a Security Enabler for Enterprises
Associate Prof. Ian Welch (VUW, NZ)
Session Chair: Julian Jang-Jaccard

Invited Talk 3:
13:20 – 14:00 (4 July)

Orchestration and Automation of Cybersecurity: Issues and Challenges
Dr. Surya Nepal (CSIRO, AU)
Session Chair: Josef Pieprzyk

Invited Talk 4:
14:00 – 14:40 (4 July)

Graphical Security Models
Dr. Dong Seong (Dan) Kim (UC, NZ)
Session Chair: Suriadi Suriadi

Regular papers – Session 5A + 5B
15:00 – 16:15 (4 July)

Regular Papers – Session 5A: Identity-based Encryption
Session Chair: Debin Gao

Mergeable and Revocable Identity-Based Encryption

Shengmin Xu, Guomin Yang, Yi Mu and Willy Susilo

ID-based Encryption with Equality Test against Insider Attack

Tong Wu, Sha Ma, Yi Mu and Shengke Zeng

Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance

Atsushi Takayasu and Yohei Watanabe


Regular Papers – Session 5B: Privacy I
Session Chair: Josef Pieprzyk

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

Keita Emura

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data

Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu and Ye Wang

Private Graph Intersection Protocol

Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu and Su Peng

Regular Papers – Session 6A
16:15 – 17:05 (4 July)

Regular Papers – Session 6A: Network Security
Session Chair: Shengli Liu

Prover Efficient Public Verification of Dense or Sparse/structured Matrix-vector Multiplication

Jean-Guillaume Dumas and Vincent Zucca

JSFfox: Run-timely Confining JavaScript for Firefox

Weizhong Qiang, JiaZhen Guo, Hai Jin, and Weifeng Li

Short papers – Session 2A + 2B
16:15 – 17:10 (4 July)

Short Papers – Session 2A
Session Chair: Johannes Braun

Stegogames

Clark Thomborson and Marc Jeanmougin

A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes

Dwight Horne and Suku Nair

Big Sensing Data Curation in Resilient Cloud Data Centre for Next Generation IoT and WSN (special 5 min presentation)

Chi Yang, Deepak Puthal, Saraju P. Mohanty, Shaoning Pang and Xuyun Zhang

Short Papers – Session 2B
Session Chair: Guomin Yang

Fully Context-Sensitive CFI for COTS Binaries

Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang and Guozhong Sun

Dual-Mode Cryptosystem Based on the Learning with Errors Problem

Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu and Dingding Jia

Keynote Speech 2:
09:00 - 10:00 (5 July)

I was sure that was my password... and other just so law enforcement stories
Peter Pilley (DIA, NZ)
Session Chair: Paul Watters

Regular papers – Session 7A + 7B
10:00 – 11:15 (5 July)

Regular Papers – Session 7A: Elliptic Curve Cryptograph
Session Chair: Keita Emura

Generating Complete Edwards Curves

Theo Fanuela Prabowo and Chik How Tan

Secure GLS Recomposition for Sum-of-Square Cofactors

Eunkyung Kim and Mehdi Tibouchi

Differential Addition on Twisted Edwards Curves

Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini


Regular Papers – Session 7B: Authentication
Session Chair: Puwen Wei

Privacy-Preserving k-time Authenticated Secret Handshakes

Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu and Yong Yu

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pohls, Kai Samelin and Daniel Slamanig

A QR Code Watermarking Approach based on the DWT-DCT Technique

Yang-Wai Chow, Willy Susilo, Joseph Tonien and Wei Zong

Invited Talk 5:
11:40 – 12:20 (5 July)

Compact-LWE for Lightweight Public Key Encryption and Leveled IoT Authentication
Dr. Dongxi Liu (CSIRO, AU)
Session Chair: Josef Pieprzyk

Invited Talk 6:
13:20 – 14:00 (5 July)


Session Chair: Julian Jang-Jaccard

UniteCloud: A Resilient Private Cloud Platform for Education and Research Service
Prof. Paul S. Pang (UniTec, NZ)

Regular papers – Session 8A + 8B
14:00 – 14:50 (5 July)

Regular Papers – Session 8A: Malware Detection
Session Chair: Shabnam Kasra Kermanshahi

SafeStack+: Enhanced Dual Stack to Combat Data-Flow Hijacking

Yan Lin, Xiaoxiao Tang and Debin Gao

A New Malware Classiffcation Approach Based on Malware Dynamic Analysis

Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang and Qiang Yang


Regular Papers – Session 8B: Privacy II
Session Chair: Weizhong Qiang

Computing Aggregates over Numeric Data with Personalized Local Differential Privacy

Mousumi Akter and Tanzima Hashem

An Efficient Toolkit for Computing Private Set Operations

Alex Davidson and Carlos Cid

Regular papers – Session 9A
15:15 – 16:30 (5 July)

Regular Papers – Session 9A: Cryptanalysis III
Session Chair: Man Ho Au

Cryptanalysis of Simpira v2

Ivan Tjuawinata, Tao Huang and Hongjun Wu

Statistical Integral Distinguisher with Multi-Structure and Its Application on AES

Tingting Cui, Ling Sun, Huaifeng Chen and Meiqin Wang

Conditional Differential Cryptanalysis for Kreyvium

Yuhei Watanabe, Takanori Isobe and Masakatu Morii

Short papers – Session 3A
15:15 – 16:30 (5 July)

Short Papers – Session 3A
Session Chair: Josef Pieprzyk

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure

Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke and Ernest Foo

Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Jason H.M. Ying and Noboru Kunihiro

Conference Closing
16:30 (5 July)

Accepted Papers

ACISP 2017 Accepted Regular Papers

Authors Paper Title
Keita Emura Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Puwen Wei, Wei Wang, Bingxin Zhu and Siu Ming Yiu Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin and Daniel Slamanig Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Katsuyuki Takashima New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Fan Jiang, Cen Zhang and Shaoyin Cheng FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability
Shiwei Zhang, Yi Mu, Guomin Yang and Xiaofen Wang Hierarchical Functional Encryption for Linear Transformations
Theo Fanuela Prabowo and Chik How Tan Generating Complete Edwards Curves
Hao Sun, Xiaofeng Wang, Rongmao Chen, Jinshu Su and Yilun Wu PriMal: Cloud-based Privacy-preserving Malware Detection
Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu and Yi Wang A New Malware Classification Approach Based on Malware Dynamic Analysis
Shengmin Xu, Guomin Yang and Yi Mu Mergeable and Revocable Identity-Based Encryption
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson and Kenneth Koon-Ho Wong Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Shuai Han and Shengli Liu KDM-Secure Public-Key Encryption from Constant-Noise LPN
Eunkyung Kim and Mehdi Tibouchi Secure GLS Recomposition for Sum-of-Square Cofactors
Hui Cui, Robert H. Deng, Joseph Liu and Yingjiu Li Attribute-Based Encryption with Expressive and Authorized Keyword Search
Sumanta Sarkar and Habeeb Syed Analysis of Toeplitz MDS Matrices
Gildas Avoine, Xavier Carpent, Barbara Kordy and Florent Tardif How to Handle Rainbow Tables with External Memory
Jakob Wenzel, Eik List, Christian Forler and Stefan Lucks Reforgeability of Authenticated Encryption Schemes
Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu and Ye Wang Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage
Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu and Su Peng Private Graph Intersection Protocol
Tong Wu, Sha Ma and Yi Mu ID-based Encryption with Equality Test against Insider Attack
Jean-Guillaume Dumas and Vincent Zucca Prover efficient public verification of dense or sparse/structured matrix-vector multiplication
Yangguang Tian, Guomin Yang, Yi Mu and Shiwei Zhang Privacy-Preserving k-time Authenticated Secret Handshakes
Mousumi Akter and Tanzima Hashem Computing Aggregates over Numeric Data with Personalized Local Differential Privacy
Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang and Yingjiao Niu Splitting Third-party Libraries’ Privileges from Android Apps
Mengce Zheng, Noboru Kunihiro and Honggang Hu Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandurangan Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii Improved Integral Attack on HIGHT
Shabnam Kasra Kermanshahi, Joseph Liu and Ron Steinfeld Multi-user cloud-based secure keyword search
Ivan Tjuawinata, Tao Huang and Hongjun Wu Cryptanalysis of Simpira v2
Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu Exploring Effect of Location Number on Map-Based Graphical Password Authentication
Tingting Cui, Ling Sun, Huaifeng Chen and Meiqin Wang Statistical Integral Distinguisher with Multi-Structure and Its Application on AES
Ahto Buldas, Matthias Geihs and Johannes Buchmann Long-Term Secure Commitments via Extractable-Binding Commitments
Zhuolin Mei, Hong Zhu, Bing Wu and Hongbo Li A Searchable Encryption method supporting Fuzzy Keyword Search and Access Control
Atsushi Takayasu and Yohei Watanabe Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Yuhei Watanabe, Takanori Isobe and Masakatu Morii Conditional Differential Cryptanalysis for Kreyvium
Wei Zhong, Yang-Wai Chow, Joseph Tonien and Willy Susilo A QR Code Watermarking Approach based on the DWT-DCT Technique
Shujie Cui, Muhammad Rizwan Asghar, Steven Galbraith and Giovanni Russello Secure and Practical Searchable Encryption: A Position Paper
Alex Davidson and Carlos Cid An Efficient Toolkit for Computing Private Set Operations
Weizhong Qiang, Jiazhen Guo, Hai Jin and Weifeng Li JSFfox: Run-timely Confining JavaScript for Firefox
Xiao Zhang, Shengli Liu and Dawu Gu Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption
Yan Lin, Xiaoxiao Tang and Debin Gao SafeStack+: Enhanced Dual Stack to Combat Data-Flow Hijacking
Yusuke Naito Indifferentiability of Double-Block-Length Hash Function without Feed-Forward Operations
Yanjiang Yang, Joseph Liu, Zhuo Wei and Xinyi Huang Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud
Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini Differential Addition on Twisted Edwards Curves

ACISP 2017 Accepted Short Papers

Authors Paper Title
Abhishek Singh, Binanda Sengupta and Sushmita Ruj Certificate Transparency with Enhancements and Short Proofs
Moritz Horsch, Johannes Braun, Dominique Metz and Johannes Buchmann Update-tolerant and Revocable Password Backup
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge and Felix Rohrbach Redactable Graph Hashing, Revisited
Swapan Maiti, Shamit Ghosh and Dipanwita Roy Chowdhury On the Security of Designing A Cellular Automata Based Stream Cipher
Clark Thomborson and Marc Jeanmougin Stegogames
Dwight Horne and Suku Nair A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes
Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin and Shizhen Wang Fully Context-Sensitive CFI for COTS Binaries
Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu and Dingding Jia Dual-Mode Cryptosystem Based on the Learning with Errors Problem
Nicholas Rodofile, Thomas Schmidt, Sebastian Sherry, Christopher Djamaludin, Kenneth Radke and Ernest Foo Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
Jason Ying and Noboru Kunihiro Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Sponsors