1
2
3
Adams, Carlisle
2023
Table of Contents:
“...Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious...”2023
Full text
4
5
Debar, Hervé
2021
Table of Contents:
“... -- AI and Security/Privacy 10 Understanding ff for Differential Privacy in Differencing Attack Scenarios -- ToFi: An Algorithm to Defend against Byzantine Attacks in Federated Learning -- TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator...”2021
Full text