1
Kim, Howon
2024
Table of Contents:
“... with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP...”2024
Full text
2
3
Carlet, Claude
2024
Table of Contents:
“...Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities -- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH -- Improving the Rectangle Attack on GIFT...”2024
Full text
4
Kim, Suhri
2024
Table of Contents:
“...Cryptanalysis & Quantum Cryptanalysis -- Enhancing the Related-Key Security of PIPO through New Key Schedules -- Distinguisher and Related-Key Attack on HALFLOOP 96 -- Revisiting Key Switching Techniques with Applications to Light-Key FHE -- Optimized...”2024
Full text
5
Smith, Benjamin
2024
Table of Contents:
“... -- 2 Differential Cryptanalysis -- Key-Recovery Attacks on CRAFT and WARP -- Differential Analysis of the Ternary Hash Function Troika -- Another Look at Differential-Linear Attacks -- 3 Cryptographic Primitives -- Rank Metric Trapdoor Functions...”2024
Full text
6
Table of Contents:
“...Isogeny-Based Cryptography -- Adaptive attacks against FESTA without input validation or constant time implementation -- Updatable Encryption from Group Actions -- Fault Attack on SQIsign -- Multivariate Cryptography -- Cryptanalysis of the SNOVA...”
Full text
Full text
7
8
Andreoni, Martin
2024
Table of Contents:
“...AAC - Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA - Security in Machine...”2024
Full text
9
10
Ge, Chunpeng
2024
Table of Contents:
“... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...”2024
Full text
11
Mazumdar, Bodhisatwa
2024
Table of Contents:
“... over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient...”2024
Full text
12
Aguilar, Jose
2024
Table of Contents:
“... classification -- Computer room failure reporting system for a Higher Education Institution -- Recent Advances in Machine Learning for Differential Cryptanalysis -- Addressing the Diet Problem with Constraint Programming Enhanced with Machine Learning -- Assessing...”2024
Full text
13
Chaturvedi, Atul
2024
Table of Contents:
“... Multivariate Aggregate and Multi Signature Scheme -- Optical Network Modeling and Performance using Random Graph Theory -- A Survey on Recent Progress in Blockchain Technology -- Cryptanalysis of lattice based threshold changeable multi-secret sharing scheme...”2024
Full text
14
De, Debashis
2024
Table of Contents:
“...Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment -- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques -- Cryptanalysis and improvement of a mutual authentication scheme...”2024
Full text
15
Bhasin, Shivam
2024
Table of Contents:
“... -- Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application -- Grover on chosen IV related key attack against GRAIN-128a -- Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm -- Practical Aspects of Vertical Side-Channel...”2024
Full text
16
18
Meng, Weizhi
2023
Table of Contents:
“... Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source...”2023
Full text
19
Table of Contents:
“... -- Analysis and identification of forensic events using non-parametric density estimation -- Fuzzy signature based model in material handling management -- On Choquet integral in ranking crimes -- The Effects of Knowledge Extraction Approaches on Cryptanalysis...”
Full text
Full text
20