1
Information Security Applications [E-Book] : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers /
Kim, Howon
2024
Table of Contents: ... with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP...

Full text 
2
Information Security and Cryptology - ICISC 2023 [E-Book] : 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II /
3
Selected Areas in Cryptography - SAC 2023 [E-Book] : 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers /
Table of Contents: ...Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities -- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH -- Improving the Rectangle Attack on GIFT...

Full text 
4
Information Security and Cryptology - ICISC 2023 [E-Book] : 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I /
Kim, Suhri
2024
Table of Contents: ...Cryptanalysis & Quantum Cryptanalysis -- Enhancing the Related-Key Security of PIPO through New Key Schedules -- Distinguisher and Related-Key Attack on HALFLOOP 96 -- Revisiting Key Switching Techniques with Applications to Light-Key FHE -- Optimized...

Full text 
5
Selected Areas in Cryptography [E-Book] : 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers /
Table of Contents: ... -- 2 Differential Cryptanalysis -- Key-Recovery Attacks on CRAFT and WARP -- Differential Analysis of the Ternary Hash Function Troika -- Another Look at Differential-Linear Attacks -- 3 Cryptographic Primitives -- Rank Metric Trapdoor Functions...

Full text 
6
Post-Quantum Cryptography [E-Book] : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II /
Table of Contents: ...Isogeny-Based Cryptography -- Adaptive attacks against FESTA without input validation or constant time implementation -- Updatable Encryption from Group Actions -- Fault Attack on SQIsign -- Multivariate Cryptography -- Cryptanalysis of the SNOVA...

Full text 
7
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I /
8
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II /
Table of Contents: ...AAC - Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA - Security in Machine...

Full text 
9
Information Security and Cryptology [E-Book] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I /
10
Information Security and Cryptology [E-Book] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II /
Table of Contents: ... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...

Full text 
11
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings /
Table of Contents: ... over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient...

Full text 
12
Advances in Computing [E-Book] : 17th Colombian Conference on Computing, CCC 2023, Medellin, Colombia, August 10-11, 2023, Revised Selected Papers /
Table of Contents: ... classification -- Computer room failure reporting system for a Higher Education Institution -- Recent Advances in Machine Learning for Differential Cryptanalysis -- Addressing the Diet Problem with Constraint Programming Enhanced with Machine Learning -- Assessing...

Full text 
13
Cryptology and Network Security with Machine Learning [E-Book] : Proceedings of ICCNSML 2022 /
Table of Contents: ... Multivariate Aggregate and Multi Signature Scheme -- Optical Network Modeling and Performance using Random Graph Theory -- A Survey on Recent Progress in Blockchain Technology -- Cryptanalysis of lattice based threshold changeable multi-secret sharing scheme...

Full text 
14
Proceedings of International Conference on Network Security and Blockchain Technology [E-Book] : ICNSBT 2023 /
Table of Contents: ...Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment -- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques -- Cryptanalysis and improvement of a mutual authentication scheme...

Full text 
15
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I /
Table of Contents: ... -- Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application -- Grover on chosen IV related key attack against GRAIN-128a -- Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm -- Practical Aspects of Vertical Side-Channel...

Full text 
16
Cryptology and Network Security with Machine Learning [E-Book] : Proceedings of ICCNSML 2023 /
17
A Nature-Inspired Approach to Cryptology [E-Book] /
18
Information Security Practice and Experience [E-Book] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings /
Table of Contents: ... Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source...

Full text 
19
Computational Intelligence and Mathematics for Tackling Complex Problems 4 [E-Book] /
Table of Contents: ... -- Analysis and identification of forensic events using non-parametric density estimation -- Fuzzy signature based model in material handling management -- On Choquet integral in ranking crimes -- The Effects of Knowledge Extraction Approaches on Cryptanalysis...

Full text 
20
Soft Computing: Theories and Applications [E-Book] : Proceedings of SoCTA 2022 /