> The 19th ACM ASIA Conference on Computer and Communications Security (**ACM ASIACCS 2024**) is held in **Singapore** from the **1st to 5th of July, 2024**.
- https://asiaccs2024.sutd.edu.sg/wp-content/uploads/2024/06/toc.html
## Privacy-Preserving Protocols
- [SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing](https://dl.acm.org/doi/10.1145/3634737.3657024 " ")
- [zkMatrix: Batched Short Proof for Committed Matrix Multiplication](https://dl.acm.org/doi/10.1145/3634737.3645003 " ")
- [Honest Majority Multiparty Computation over Rings with Constant Online Communication](https://dl.acm.org/doi/10.1145/3634737.3661136 " ")
- [Ratel: MPC-extensions for Smart Contracts](https://dl.acm.org/doi/10.1145/3634737.3661142 " ")
## Post Quantum
- [HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning](https://dl.acm.org/doi/10.1145/3634737.3656285 " ")
- [Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies](https://dl.acm.org/doi/10.1145/3634737.3657008 " ")
- [REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography](https://dl.acm.org/doi/10.1145/3634737.3657016 " ")
- [Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond](https://dl.acm.org/doi/10.1145/3634737.3637661 " ")
- [SoK: CryptographicEstimators -- a Software Library for Cryptographic Hardness Estimation](https://dl.acm.org/doi/10.1145/3634737.3645007 " ")
- [OPRFs from Isogenies: Designs and Analysis](https://dl.acm.org/doi/10.1145/3634737.3645010 " ")
## Crypto and Privacy
- [Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries](https://dl.acm.org/doi/10.1145/3634737.3657012 " ")
- [Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption](https://dl.acm.org/doi/10.1145/3634737.3656292 " ")
- [Efficient Unbalanced Quorum PSI from Homomorphic Encryption](https://dl.acm.org/doi/10.1145/3634737.3657001 " ")
- [SweetPAKE: Key exchange with decoy passwords](https://dl.acm.org/doi/10.1145/3634737.3645009 " ")
- [MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning](https://dl.acm.org/doi/10.1145/3634737.3637680 " ")
- [LightPIR: Single-Server PIR via FHE without Gaussian Noise](https://dl.acm.org/doi/10.1145/3634737.3661140 " ")
- [Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting](https://dl.acm.org/doi/10.1145/3634737.3656291 " ")
- [Skye: An Expanding PRF based Fast KDF and its Applications](https://dl.acm.org/doi/10.1145/3634737.3637673 " ")
- [Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy](https://dl.acm.org/doi/10.1145/3634737.3637646 " ")
## Distributed and Decentralized Systems
- [An Empirical Study of Consensus Protocols’ DoS Resilience](https://dl.acm.org/doi/10.1145/3634737.3656997 " ")
- [SilentProof: Anonymous Authentication with Blockchain-Backed Offloading](https://dl.acm.org/doi/10.1145/3634737.3637635 " ")
- [Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains](https://dl.acm.org/doi/10.1145/3634737.3637656 " ")
- [SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks](https://dl.acm.org/doi/10.1145/3634737.3637681 " ")
- [zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain](https://dl.acm.org/doi/10.1145/3634737.3637663 " ")
- [CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification](https://dl.acm.org/doi/10.1145/3634737.3637664 " ")
- [BlindShuffler: Universal and Trustless Mixing for Confidential Transactions](https://dl.acm.org/doi/10.1145/3634737.3637669 " ")
- [PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge](https://dl.acm.org/doi/10.1145/3634737.3637679 " ")
## Authentication and Signatures
- [Delegating FIDO Credentials Using Single-use ECDSA Signatures](https://dl.acm.org/doi/10.1145/3634737.3657004 " ")
- [Quantum-Safe Account Recovery for WebAuthn](https://dl.acm.org/doi/10.1145/3634737.3661138 " ")
- [Byzantine Fault-Tolerant Aggregate Signatures](https://dl.acm.org/doi/10.1145/3634737.3657020 " ")
- [Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications](https://dl.acm.org/doi/10.1145/3634737.3637657 " ")