1
Smart Card Research and Advanced Applications [E-Book] : 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers /
Table of Contents: ... -- Protecting AES -- Guarding the First Order: The Rise of AES Maskings -- Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES -- Self-Timed Masking: Implementing Masked S-Boxes Without Registers -- Evaluation Methodologies -- An Evaluation Procedure...

Full text 
2
6GN for Future Wireless Networks [E-Book] : 5th EAI International Conference, 6GN 2022, Harbin, China, December 17-18, 2022, Proceedings, Part I /
Li, Ao
2023
Table of Contents: ... Simulation System -- Electromagnetic Propagation Path And Signal Attenuation Prediction Based On DEM Electronic Map -- Multi-Object Tracking Based on YOLOX and DeepSORT Algorithm -- Embedding with Bounding Box Contracting for Multi-Object Tracking -- Cross-Stage...

Full text 
3
Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV [E-Book] : International Workshop, COINE 2022, Virtual Event, May 9, 2022, Revised Selected Papers /
Table of Contents: ... of Reactive Plans Using Social Norms -- Self-Learning Governance of Black-Box Multi-Agent Systems -- Computational Theory of Mind for Human-Agent Coordination -- Computational Discovery of Transaction-Based Financial Crime via Grammatical Evolution: The Case...

Full text 
4
Responsible AI and Analytics for an Ethical and Inclusive Digitized Society [E-Book] : 20th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2021, Galway, Ireland, September 1-3, 2021, Proceedings /
Table of Contents: ... Review of Fairness in Artificial Intelligence Algorithms -- Is Downloading this App Consistent with my Values? Conceptualizing a Value-Centered Privacy Assistant -- Operationalizing a Glass Box Approach by Means of Visualization: Applied to a GA-profiling...

Full text 
5
Theory of Cryptography [E-Book] : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I /
Table of Contents: ... -- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs -- Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness -- Tight Security Bounds for Micali's SNARGs -- Acyclicity Programming for Sigma-Protocols...

Full text 
6
PRIMA 2020: Principles and Practice of Multi-Agent Systems : 23rd International Conference, Nagoya, Japan, November 18-20, 2020, Proceedings [E-Book] /
Bai, Quan
2021
Table of Contents: ... Explanations of Multimorbidity Treatment Plans -- The Persistence of False Memory: Brain in a Vat despite Perfect Clocks -- Box-Office Prediction Based on Essential Features Extracted from Agent-Based Modeling -- Short Duration Aggregate Statistical Model Checking...

Full text 
7
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part IV /
Table of Contents: ...Zero Knowledge -- Witness Authenticating NIZKs and Applications -- Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs -- Compressing Proofs of k-Out-Of-n Partial Knowledge -- Mac'n'Cheese: Zero-Knowledge Proofs for Boolean...

Full text 
8
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part III /
Table of Contents: ... -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non...

Full text 
9
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II /
Table of Contents: ... for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power...

Full text 
10
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I /
Table of Contents: ... Learning With Errors -- Quantum Cryptography -- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds -- On the Concurrent Composition of Quantum Zero-Knowledge -- Multi-theorem Designated-Verifier NIZK for QMA -- On the Round Complexity...

Full text 
11
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II /
Table of Contents: ... Computation from Black-Box Two-Round Oblivious Transfer -- On the Round Complexity of Black-Box Secure MPC -- ATLAS: Efficient and Scalable MPC in the Honest Majority Setting -- Unconditional Communication-Efficient MPC via Hall's Marriage Theorem -- Non...

Full text 
12
Wireless and Satellite Systems [E-Book] : 11th EAI International Conference, WiSATS 2020, Nanjing, China, September 17-18, 2020, Proceedings, Part I /
Table of Contents: ...Simulation System for Space Debris Intelligent Detecting -- Traffic Prediction Based Capacity Pre-assignment Scheme for Low Latency in LEO Satellite Communication Systems -- Distributed Cooperative Positioning Algorithm Based on Message Passing using Box...

Full text 
13
Progress in Cryptology - INDOCRYPT 2021 [E-Book] : 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings /
Table of Contents: ...'s Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against...

Full text 
14
Cryptology and Network Security [E-Book] : 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings /
Table of Contents: ... Coercion Resistance and Cast as Intended Verifiability in Remote eVoting -- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs -- THC: Practical and Cost-Effective Verification of Delegated Computation -- Tiramisu: Black-Box...

Full text 
15
Artificial Intelligence in HCI [E-Book] : Second International Conference, AI-HCI 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings /
Table of Contents: ...Ethics, Trust and Explainability -- Can you Trust the Black Box? The Effect of Personality Traits on Trust in AI-Enabled User Interfaces -- Towards Design Principles for User-Centric Explainable AI in Fraud Detection -- Disentangling Trust...

Full text 
16
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
17
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
18
Selected Areas in Cryptography -- SAC 2013 [E-Book] : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers /
Table of Contents: ... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...

Full text 
19
Progress in Cryptology – AFRICACRYPT 2014 [E-Book] : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /
Table of Contents: ... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...

Full text 
20
Advances in Cryptology – ASIACRYPT 2014 [E-Book] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II /
Table of Contents: ... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....

Full text