1
Bilge, Leyla
2021
Table of Contents:
“...: An Analysis of Domain Impersonation in the Lower DNS Hierarchy -- Help, my Signal has bad Device! - Breaking the Signal Messenger's Post-Compromise Security through a Malicious Device -- Refined Grey-Box Fuzzing with Sivo -- SCRUTINIZER: Detecting Code Reuse...”2021
Full text
2
Dunkelman, Orr
2021
Table of Contents:
“... Encodings in White-Box Implementations -- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting -- High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.-....”2021
Full text
3
Bao, Wei
2021
Table of Contents:
“... Design -- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher -- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function -- Network Security 15 Topology Validator - Defense against Topology...”2021
Full text
4
Nissim, Kobbi
2021
Table of Contents:
“... -- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs -- Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness -- Tight Security Bounds for Micali's SNARGs -- Acyclicity Programming for Sigma-Protocols...”2021
Full text
5
Intan, Rolly
2021
Table of Contents:
“...-Box Implementations of the SM4 Block Cipher -- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data -- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT -- Randomized Component Based Secure Secret...”2021
Full text
6
Adhikari, Avishek
2021
Table of Contents:
“...'s Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against...”2021
Full text
7
Table of Contents:
“...Introduction -- Preliminaries: Basics and Notation -- Preliminaries: Device-independent Concepts -- Introduction to the Showcases -- Single-round Box -- Multi-round Box -- Working Under the IID Assumption -- Reductions to IID: Parallel Interaction...”
Full text
Full text
8
9
Salvendy, Gavriel
2017
Table of Contents:
“... between Senior Communities with Telepresence Robots -- Reopening the Black Box of Career Age and Research Performance. - Intergenerational Techno-Creative Activities in a Library Fablab. - ‘Industrie 4.0’ and an Aging Workforce – A Discussion from a...”2017
Full text
10
Hirt, Martin
2016
Table of Contents:
“... Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post...”2016
Full text
11
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
12
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
13
Knudsen, Lars R
2016
Table of Contents:
“... -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations...”2016
Full text
14
Table of Contents:
“... Recommendation System Using Real User Monitoring Data -- Is The Web HTTP/2 Yet -- Modeling HTTP/2 Speed from HTTP/1 Traces -- Behind Box-Office Sales: Understanding Automation Spam in Online Classifieds -- Towards a Model of DNS Client Behavior -- Detecting DNS Root...”
Full text
Full text
15
Aiello, Marco
2016
Table of Contents:
“...Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service -- vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments -- Dynamic SLAs for Clouds -- Reinforcement Learning Techniques...”2016
Full text