Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2023
- research-articleNovember 2023
Verifiable Verification in Cryptographic Protocols
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2023, Pages 3239–3253https://doi.org/10.1145/3576915.3623151Common verification steps in cryptographic protocols, such as signature or message authentication code checks or the validation of elliptic curve points, are crucial for the overall security of the protocol. Yet implementation errors omitting these steps ...
- research-articleNovember 2023
Post Quantum Fuzzy Stealth Signatures and Applications
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2023, Pages 371–385https://doi.org/10.1145/3576915.3623148Private payments in blockchain-based cryptocurrencies have been a topic of research, both academic and industrial, ever since the advent of Bitcoin. Stealth address payments were proposed as a solution to improve payment privacy for users and are, in ...
- tutorialJuly 2023
Invariants: Computation and Applications
ISSAC '23: Proceedings of the 2023 International Symposium on Symbolic and Algebraic ComputationJuly 2023, Pages 31–40https://doi.org/10.1145/3597066.3597149Invariants withstand transformations and, therefore, represent the essence of objects or phenomena. In mathematics, transformations often constitute a group action. Since the 19th century, studying the structure of various types of invariants and ...
- research-articleMay 2022
Sig-wasserstein GANs for time series generation
ICAIF '21: Proceedings of the Second ACM International Conference on AI in FinanceNovember 2021, Article No.: 28, Pages 1–8https://doi.org/10.1145/3490354.3494393Synthetic data is an emerging technology that can significantly accelerate the development and deployment of AI machine learning pipelines. In this work, we develop high-fidelity time-series generators, the SigWGAN, by combining continuous-time ...
-
- research-articleJanuary 2022
Double-Execution Strategies Using Path Signatures
SIAM Journal on Financial Mathematics (SIFIN), Volume 13, Issue 4Dec 2022, Pages 1379–1417https://doi.org/10.1137/21M1456467We employ the expected signature of equity and foreign exchange markets to derive an optimal double-execution trading strategy. The signature of a path of a stochastic process is a sequence of real numbers that provides a full description of the ...
- research-articleOctober 2021
Sig-SDEs model for quantitative finance
ICAIF '20: Proceedings of the First ACM International Conference on AI in FinanceOctober 2020, Article No.: 7, Pages 1–8https://doi.org/10.1145/3383455.3422553Mathematical models, calibrated to data, have become ubiquitous to make key decision processes in modern quantitative finance. In this work, we propose a novel framework for data-driven model selection by integrating a classical quantitative setup with ...
- research-articleNovember 2020
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2020, Pages 1769–1787https://doi.org/10.1145/3372297.3423367Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS '18), we present two threshold ECDSA protocols, for any number of signatories and any threshold, that improve as follows over the state of the art: -- For both protocols, only the last ...
- research-articleOctober 2020
Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator
APKC '20: Proceedings of the 7th ACM Workshop on ASIA Public-Key CryptographyOctober 2020, Pages 9–18https://doi.org/10.1145/3384940.3388959To prove the graph relations such as the connectivity and the isolation for a certified graph, the system of graph signature and proofs have been proposed. In this system, an issuer generates a signature certifying the topology of an undirected graph, ...
- research-articleJanuary 2020
Optimal Execution with Rough Path Signatures
SIAM Journal on Financial Mathematics (SIFIN), Volume 11, Issue 22020, Pages 470–493https://doi.org/10.1137/19M1259778We present a method for obtaining approximate solutions to the problem of optimal execution, based on a signature method. The framework is general, only requiring that the price process is a geometric rough path and the price impact function is a ...
- tutorialOctober 2018
Bringing VoIP Signatures to Mobile Devices
IPTComm '13: Proceedings of Principles, Systems and Applications on IP TelecommunicationsOctober 2013, Pages 1–7https://doi.org/10.1145/2554666.2554669With the advent of LTE another technology is gaining momentum in mobile communication, viz. Voice-over-IP (VoIP). While LTE provides state-of-the-art security features such as confidentiality, integrity, and authenticity, non-repudiation of voice ...
- short-paperDecember 2017
K-Means Clustering of Biological Sequences
ADCS '17: Proceedings of the 22nd Australasian Document Computing SymposiumDecember 2017, Article No.: 2, Pages 1–4https://doi.org/10.1145/3166072.3166076The unsupervised clustering of biological sequences is an important task in the bioinformatics space; however, the high computational expense associated with computing pairwise distances between these sequences makes many traditional clustering ...
- research-articleNovember 2017
Point-Of-Interest Recommender System for Social Groups
Procedia Computer Science (PROCS), Volume 114, Issue CNovember 2017, Pages 159–164https://doi.org/10.1016/j.procs.2017.09.020This paper presents a signature based point of interest (POI) group recommendation system which provides personalized recommendations of places, such as restaurants, for mobile social groups. The growth of location-based social networking (LBSN) like ...
- research-articleOctober 2017
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2017, Pages 1843–1855https://doi.org/10.1145/3133956.3134023In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appears to be an attractive and efficient option. A particularly interesting lattice-based signature scheme is BLISS, offering key and signature sizes in the ...
- research-articleOctober 2017
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
- Melissa Chase,
- David Derler,
- Steven Goldfeder,
- Claudio Orlandi,
- Sebastian Ramacher,
- Christian Rechberger,
- Daniel Slamanig,
- Greg Zaverucha
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2017, Pages 1825–1842https://doi.org/10.1145/3133956.3133997We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly ...
- research-articleApril 2017
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityApril 2017, Pages 587–598https://doi.org/10.1145/3052973.3053002Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats. Anti-virus signatures are a simple and fast detection mechanism ...
- research-articleApril 2015
Related Randomness Attacks for Public Key Cryptosystems
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityApril 2015, Pages 215–223https://doi.org/10.1145/2714576.2714622We initiate the study of related randomness attack in the face of a number of practical attacks in public key cryptography, ranges from active attacks like fault-injection, to passive attacks like software (mis)implementation on choosing random numbers. ...
- ArticleOctober 2014
Scalability Analysis of Signatures in Transactional Memory Systems
SBAC-PAD '14: Proceedings of the 2014 IEEE 26th International Symposium on Computer Architecture and High Performance ComputingOctober 2014, Pages 128–135https://doi.org/10.1109/SBAC-PAD.2014.40Signatures have been proposed in transactional memory systems to represent read and write sets and to decouple transaction conflict detection from private caches or to accelerate it. Generally, signatures are implemented as Bloom filters that allow ...
- ArticleSeptember 2014
DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability
- Niels L. M. van Adrichem,
- Antonio Reyes Lua,
- Xin Wang,
- Muhammad Wasif,
- Ficky Fatturrahman,
- Fernando A. Kuipers
JISIC '14: Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics ConferenceSeptember 2014, Pages 9–16https://doi.org/10.1109/JISIC.2014.12DNSSEC offers protection against spoofing of DNS data by providing authentication of its origin, ensuring integrity and giving a way to authenticate denial of existence by using public-key cryptography. Where the relevance of securing a technology as ...
- research-articleJuly 2014
Predicting zero reductions in Gröbner basis computations
SNC '14: Proceedings of the 2014 Symposium on Symbolic-Numeric ComputationJuly 2014, Pages 109–110https://doi.org/10.1145/2631948.2631968Since Buchberger's initial algorithm for computing Gröbner bases in 1965 [1] many attempts have been taken to detect zero reductions in advance. Buchberger's Product and Chain criteria may be known the most, especially in the installaton of Gebauer and ...