1
Nissim, Kobbi
2021
Table of Contents:
“... -- On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger -- BKW Meets Fourier: New Algorithms for LPN with Sparse Parities -- Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy -- Polynomial-time...”2021
Full text
2
Malkin, Tal
2021
Table of Contents:
“... -- Low-Complexity Cryptography -- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2] -- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications -- No Time to Hash: On Super-Efficient Entropy Accumulation...”2021
Full text
3
Catania, Barbara
2016
Table of Contents:
“... for PAMs -- On the Effects of Nondeterminism on Ordered Restarting Automata -- Quantum Walks on Two-Dimensional Grids with Multiple Marked Locations -- How to Smooth Entropy? -- Bounded TSO-to-SC Linearizability is Decidable -- Probabilistic Autoreductions...”2016
Full text
4
Barreto, Paulo
2016
Table of Contents:
“...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....”2016
Full text
5
Echizen, Isao
2016
Table of Contents:
“... and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients...”2016
Full text
6
7
Batina, Lejla.
2014
Table of Contents:
“... Characterization of Arbiter PUFs -- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM -- RNGs and SCA Issues in Hardware -- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG -- Entropy Evaluation for Oscillator-Based True...”2014
Full text
8
Padró, Carles.
2014
Table of Contents:
“... -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption...”2014
Full text
9
Table of Contents:
“... -- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule – The Interval Rule -- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations -- Measuring Disclosure Risk with Entropy in Population Based Frequency...”
Full text
Full text
10
Danger, Jean Luc.
2014
Table of Contents:
“...On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous...”2014
Full text
11
Guyot, Vincent.
2013
Table of Contents:
“...-Party Authenticated Key Exchange Protocol Using One-Time Key.- Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.- Mantle: A Novel DOSN Leveraging Free Storage and Local Software.- Descriptional Entropy: Application to Security Software...”2013
Full text
12
Kotenko, Igor.
2012
Table of Contents:
“... Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.....”2012
Full text