1
2
Ge, Chunpeng
2024
Table of Contents:
“... of Data Complexity on Offline Simon's Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric...”2024
Full text
3
Ge, Chunpeng
2024
Table of Contents:
“... Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption -- Full Domain Functional Bootstrapping with Least Significant Bit Encoding -- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity...”2024
Full text
4
Gabbouj, Moncef
2024
Table of Contents:
“... -- An Assurance Case Practice of AI-enabled Systems on Maritime Inspection -- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification -- A Verifiable Dynamic Multi-Secret Sharing...”2024
Full text
5
Gabbouj, Moncef
2024
Table of Contents:
“... of Adaptive Algorithm for Dynamic Adjustment of Transmission Power and Contention Window -- Deep learning-based lung nodule segmentation and 3D reconstruction algorithm for CT images -- GridFormer: Grid foreign object detection also requires Transformer...”2024
Full text
6
7
Bhasin, Shivam
2024
Table of Contents:
“... -- Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application -- Grover on chosen IV related key attack against GRAIN-128a -- Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm -- Practical Aspects of Vertical Side-Channel...”2024
Full text
8
Bhasin, Shivam
2024
Table of Contents:
“...Secure computation, Algorithm hardness, Privacy -- Threshold-Optimal MPC With Friends and Foes -- Network-Agnostic Perfectly Secure Synchronous Message Transmission Revisited -- Explicit Lower Bounds for Communication Complexity of PSM for Concrete...”2024
Full text
9
Mechkaroska, Daniela
2024
Table of Contents:
“... on quasigroups for transmission through a Gaussian channel -- Fast algorithms for cryptcodes based on quasigroups -- Cryptcodes based on quasigroups for burst channels....”2024
Full text
10
De, Debashis
2024
Table of Contents:
“... for smart grid communications -- Collision Avoidance and Drowsiness Detection System for Drivers -- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling -- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold...”2024
Full text
12
Alazab, Mamoun
2023
Table of Contents:
“... solution for Online fraud prevention and detection -- Chapter. 13. Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain....”2023
Full text
13
Dolev, Shlomi
2023
Table of Contents:
“...-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural...”2023
Full text
15
Table of Contents:
“... Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets....”
Full text
Full text
16
Johansson, Thomas
2023
Table of Contents:
“...Code-Based Cryptography -- Group-Action-Based Cryptography -- Isogenye-Based Cryptography -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models -- Post-Quantum Protocols -- Side Channel Cryptanalysis...”2023
Full text
17
De Feo, Luca
2023
Table of Contents:
“... F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit...”2023
Full text
18
Batina, Lejla
2023
Table of Contents:
“... in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform -- Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation -- Hybrid Post-Quantum Signatures in Hardware Security Keys -- Multi-Armed SPHINCS+ -- SpanL: Creating Algorithms...”2023
Full text
19
Table of Contents:
“... Algorithm for Lost Target Recovery in Wireless Sensor Network -- Power Aware Non-Orthogonal Multiple Access for IEEE 802.11ah based IoT Networks -- Effective Link Prediction in Complex Networks using Differential Evolution based Extreme Gradient Boosting...”
Full text
Full text
20