81
82
83
Adams, Carlisle
2023
Table of Contents:
“...Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious...”2023
Full text
84
85
Seo, Hwajeong
2023
Table of Contents:
“... Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over...”2023
Full text
86
Tibouchi, Mehdi
2023
Table of Contents:
“...Embedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain....”2023
Full text
87
Tibouchi, Mehdi
2023
Table of Contents:
“...Side-channel and fault attacks -- Symmetric cryptanalysis -- Web security -- Elliptic curves and pairings -- Homomorphic cryptography -- Machine learning -- Lattices and codes....”2023
Full text
88
Boldyreva, Alexandra
2023
Table of Contents:
“...Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK....”2023
Full text
89
Boldyreva, Alexandra
2023
Table of Contents:
“...Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK....”2023
Full text
90
91
Table of Contents:
“... Graph with Low Redundancy -- Applied Cryptography -- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature -- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT -- A Cross-layer Plausibly...”
Full text
Full text
92
93
94
95
96
Aziz, Ahmed
2023
Table of Contents:
“... as the money of the future -- A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks -- Energy Efficient and Secure Scheme based Compressive Sensing method for Internet of Vehicles -- Impact...”2023
Full text
97
98
Ghosh, Ankush
2023
Table of Contents:
“... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...”2023
Full text
99
100