Accepted Papers

Ordered by submission date

1. Security and Privacy Evaluation of IP Cameras on Shodan

Cheok Ieng Ng and Maryam Mehrnezhad
Royal Holloway University of London


2. Scloud+: An Efficient LWE-based KEM Without Ring/Module Structure

Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Ye Yuan and Xiaoyun Wang
Tsinghua University, Communication University of China, Huawei Technologies, Shandong Institute of Blockchain, Huawei Technologies, Huawei International Pte Ltd, and Tsinghua University


3. Transitioning to Quantum Secure Encryption Schemes

Shao Huang, Songsong Li, Ying Ouyang and Yanhong Xu
Shanghai Jiao Tong University


4. The Vision of Multi-Party Computation Technical Standards

Jingqiang Lin and Zhiquan Gao
University of Science and Technology of China


5. SoK: Post-Quantum Key Encapsulation Mechanisms - Security Definitions, Constructions, and Applications

Biming Zhou, Yiting Liu, Haodong Jiang and Yunlei Zhao
Fudan University, Henan Key Laboratory of Network Cryptography Technology, Henan Key Laboratory of Network Cryptography Technology, and Fudan University


6. Vision Paper: Do we need Standardization of Blockchain Consensus?

Zhaoxin Yang, Xiao Sui, Rujia Li, Mingfei Zhang and Sisi Duan
Tsinghua University, Tsinghua University, Tsinghua University, Shandong University, and Tsinghua University


7. Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol

Enis Golaszewski, Edward Zieglar, Alan T. Sherman, Kirellos Abou Elsaad and Jonathan D. Fuchs
University of Maryland, Baltimore County (UMBC), National Security Agency (NSA), University of Maryland, Baltimore County (UMBC), University of Maryland, Baltimore County (UMBC), and University of Maryland, Baltimore County (UMBC)