Accepted Papers
Ordered by submission date1. Security and Privacy Evaluation of IP Cameras on Shodan
Cheok Ieng Ng and Maryam Mehrnezhad
Royal Holloway University of London
2. Scloud+: An Efficient LWE-based KEM Without Ring/Module Structure
Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Ye Yuan and Xiaoyun Wang
Tsinghua University, Communication University of China, Huawei Technologies, Shandong Institute of Blockchain, Huawei Technologies, Huawei International Pte Ltd, and Tsinghua University
3. Transitioning to Quantum Secure Encryption Schemes
Shao Huang, Songsong Li, Ying Ouyang and Yanhong Xu
Shanghai Jiao Tong University
4. The Vision of Multi-Party Computation Technical Standards
Jingqiang Lin and Zhiquan Gao
University of Science and Technology of China
5. SoK: Post-Quantum Key Encapsulation Mechanisms - Security Definitions, Constructions, and Applications
Biming Zhou, Yiting Liu, Haodong Jiang and Yunlei Zhao
Fudan University, Henan Key Laboratory of Network Cryptography Technology, Henan Key Laboratory of Network Cryptography Technology, and Fudan University
6. Vision Paper: Do we need Standardization of Blockchain Consensus?
Zhaoxin Yang, Xiao Sui, Rujia Li, Mingfei Zhang and Sisi Duan
Tsinghua University, Tsinghua University, Tsinghua University, Shandong University, and Tsinghua University
7. Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol
Enis Golaszewski, Edward Zieglar, Alan T. Sherman, Kirellos Abou Elsaad and Jonathan D. Fuchs
University of Maryland, Baltimore County (UMBC), National Security Agency (NSA), University of Maryland, Baltimore County (UMBC), University of Maryland, Baltimore County (UMBC), and University of Maryland, Baltimore County (UMBC)