1
Blockchains [E-Book] : A Handbook on Fundamentals, Platforms and Applications /
2
Information Security and Cryptology [E-Book] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II /
Table of Contents: ... of Data Complexity on Offline Simon's Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric...

Full text 
3
Information Security and Cryptology [E-Book] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I /
Table of Contents: ... Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption -- Full Domain Functional Bootstrapping with Least Significant Bit Encoding -- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity...

Full text 
4
Artificial Intelligence Security and Privacy [E-Book] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I /
Table of Contents: ... -- An Assurance Case Practice of AI-enabled Systems on Maritime Inspection -- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification -- A Verifiable Dynamic Multi-Secret Sharing...

Full text 
5
Artificial Intelligence Security and Privacy [E-Book] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II /
Table of Contents: ... of Adaptive Algorithm for Dynamic Adjustment of Transmission Power and Contention Window -- Deep learning-based lung nodule segmentation and 3D reconstruction algorithm for CT images -- GridFormer: Grid foreign object detection also requires Transformer...

Full text 
6
Cryptology and Network Security with Machine Learning [E-Book] : Proceedings of ICCNSML 2022 /
7
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I /
Table of Contents: ... -- Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application -- Grover on chosen IV related key attack against GRAIN-128a -- Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm -- Practical Aspects of Vertical Side-Channel...

Full text 
8
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II /
Table of Contents: ...Secure computation, Algorithm hardness, Privacy -- Threshold-Optimal MPC With Friends and Foes -- Network-Agnostic Perfectly Secure Synchronous Message Transmission Revisited -- Explicit Lower Bounds for Communication Complexity of PSM for Concrete...

Full text 
9
Cryptocoding Based on Quasigroups [E-Book] /
Table of Contents: ... on quasigroups for transmission through a Gaussian channel -- Fast algorithms for cryptcodes based on quasigroups -- Cryptcodes based on quasigroups for burst channels....

Full text 
10
Proceedings of International Conference on Network Security and Blockchain Technology [E-Book] : ICNSBT 2023 /
Table of Contents: ... for smart grid communications -- Collision Avoidance and Drowsiness Detection System for Drivers -- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling -- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold...

Full text 
11
Classical and Modern Cryptography for Beginners [E-Book] /
12
Blockchain for Cybersecurity in Cyber-Physical Systems [E-Book] /
Table of Contents: ... solution for Online fraud prevention and detection -- Chapter. 13. Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain....

Full text 
13
Cyber Security, Cryptology, and Machine Learning [E-Book] : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings /
Table of Contents: ...-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural...

Full text 
14
Triangle Mesh Watermarking and Steganography [E-Book] /
15
Information Security [E-Book] : 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings /
Table of Contents: ... Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets....

Full text 
16
Post-Quantum Cryptography [E-Book] : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings /
Table of Contents: ...Code-Based Cryptography -- Group-Action-Based Cryptography -- Isogenye-Based Cryptography -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models -- Post-Quantum Protocols -- Side Channel Cryptanalysis...

Full text 
17
Progress in Cryptology - AFRICACRYPT 2023 [E-Book] : 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings /
Table of Contents: ... F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit...

Full text 
18
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings /
Table of Contents: ... in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform -- Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation -- Hybrid Post-Quantum Signatures in Hardware Security Keys -- Multi-Armed SPHINCS+ -- SpanL: Creating Algorithms...

Full text 
19
Advanced Network Technologies and Intelligent Computing [E-Book] : Second International Conference, ANTIC 2022, Varanasi, India, December 22-24, 2022, Proceedings, Part I /
Table of Contents: ... Algorithm for Lost Target Recovery in Wireless Sensor Network -- Power Aware Non-Orthogonal Multiple Access for IEEE 802.11ah based IoT Networks -- Effective Link Prediction in Complex Networks using Differential Evolution based Extreme Gradient Boosting...

Full text 
20
Searchable Encryption [E-Book] : From Concepts to Systems /
Ren, Kui
2023
Table of Contents: ...Introduction -- Fundamental Cryptographic Algorithms and Technologies -- Searchable Encryption Semantics -- Recent Advancements on Functionality and Performance -- Security Impact of Leakage Profiles: Threats and Countermeasures -- Towards Fully...

Full text