1
Buhan, Ileana
2023
Table of Contents:
“... -- Protecting AES -- Guarding the First Order: The Rise of AES Maskings -- Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES -- Self-Timed Masking: Implementing Masked S-Boxes Without Registers -- Evaluation Methodologies -- An Evaluation Procedure...”2023
Full text
2
Li, Ao
2023
Table of Contents:
“... Simulation System -- Electromagnetic Propagation Path And Signal Attenuation Prediction Based On DEM Electronic Map -- Multi-Object Tracking Based on YOLOX and DeepSORT Algorithm -- Embedding with Bounding Box Contracting for Multi-Object Tracking -- Cross-Stage...”2023
Full text
3
Ajmeri, Nirav
2022
Table of Contents:
“... of Reactive Plans Using Social Norms -- Self-Learning Governance of Black-Box Multi-Agent Systems -- Computational Theory of Mind for Human-Agent Coordination -- Computational Discovery of Transaction-Based Financial Crime via Grammatical Evolution: The Case...”2022
Full text
4
Dennehy, Denis
2021
Table of Contents:
“... Review of Fairness in Artificial Intelligence Algorithms -- Is Downloading this App Consistent with my Values? Conceptualizing a Value-Centered Privacy Assistant -- Operationalizing a Glass Box Approach by Means of Visualization: Applied to a GA-profiling...”2021
Full text
5
Nissim, Kobbi
2021
Table of Contents:
“... -- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs -- Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness -- Tight Security Bounds for Micali's SNARGs -- Acyclicity Programming for Sigma-Protocols...”2021
Full text
6
Bai, Quan
2021
Table of Contents:
“... Explanations of Multimorbidity Treatment Plans -- The Persistence of False Memory: Brain in a Vat despite Perfect Clocks -- Box-Office Prediction Based on Essential Features Extracted from Agent-Based Modeling -- Short Duration Aggregate Statistical Model Checking...”2021
Full text
7
Malkin, Tal
2021
Table of Contents:
“...Zero Knowledge -- Witness Authenticating NIZKs and Applications -- Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs -- Compressing Proofs of k-Out-Of-n Partial Knowledge -- Mac'n'Cheese: Zero-Knowledge Proofs for Boolean...”2021
Full text
8
Canteaut, Anne
2021
Table of Contents:
“... -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non...”2021
Full text
9
Canteaut, Anne
2021
Table of Contents:
“... for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power...”2021
Full text
10
Malkin, Tal
2021
Table of Contents:
“... Learning With Errors -- Quantum Cryptography -- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds -- On the Concurrent Composition of Quantum Zero-Knowledge -- Multi-theorem Designated-Verifier NIZK for QMA -- On the Round Complexity...”2021
Full text
11
Malkin, Tal
2021
Table of Contents:
“... Computation from Black-Box Two-Round Oblivious Transfer -- On the Round Complexity of Black-Box Secure MPC -- ATLAS: Efficient and Scalable MPC in the Honest Majority Setting -- Unconditional Communication-Efficient MPC via Hall's Marriage Theorem -- Non...”2021
Full text
12
Ding, Xiaojin
2021
Table of Contents:
“...Simulation System for Space Debris Intelligent Detecting -- Traffic Prediction Based Capacity Pre-assignment Scheme for Low Latency in LEO Satellite Communication Systems -- Distributed Cooperative Positioning Algorithm Based on Message Passing using Box...”2021
Full text
13
Adhikari, Avishek
2021
Table of Contents:
“...'s Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against...”2021
Full text
14
Conti, Mauro
2021
Table of Contents:
“... Coercion Resistance and Cast as Intended Verifiability in Remote eVoting -- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs -- THC: Practical and Cost-Effective Verification of Delegated Computation -- Tiramisu: Black-Box...”2021
Full text
15
Degen, Helmut
2021
Table of Contents:
“...Ethics, Trust and Explainability -- Can you Trust the Black Box? The Effect of Personality Traits on Trust in AI-Enabled User Interfaces -- Towards Design Principles for User-Centric Explainable AI in Fraud Detection -- Disentangling Trust...”2021
Full text
16
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
17
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
18
Lange, Tanja.
2014
Table of Contents:
“... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...”2014
Full text
19
Pointcheval, David.
2014
Table of Contents:
“... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...”2014
Full text
20
Sarkar, Palash.
2014
Table of Contents:
“... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....”2014
Full text