1
Carlet, Claude
2024
Table of Contents:
“...Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities -- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH -- Improving the Rectangle Attack on GIFT...”2024
Full text
2
Sharp, Robin
2024
Table of Contents:
“.... Network Security -- Chapter 9. Security in operating systems -- Chapter 10. Software security -- Chapter 11. Incident handling and system availability -- Chapter 12. Law and ethics -- Epilogue -- Appendix A. What's in the box? -- Appendix B. Mathematics...”2024
Full text
3
Baksi, Anubhab
2024
Table of Contents:
“...Introduction: Emergence of Quantum Computing -- Quantum Computing Fundamental and Cryptographic Perspective -- Reversible S-box Implementation with LIGHTER-R -- Quantum Implementation and Resource Estimate for RECTANGLE and KNOT -- Quantum Implementation...”2024
Full text
4
Meng, Weizhi
2023
Table of Contents:
“... Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User's Vicinity -- BAHS: a...”2023
Full text
5
De Feo, Luca
2023
Table of Contents:
“... -- Theory -- Impossibilities in Succinct Arguments: Black-box Extraction and More -- Applications of Timed-release Encryption with Implicit Authentication....”2023
Full text
6
Table of Contents:
“...: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge...”
Full text
Full text
7
Dragoni, Nicola
2023
Table of Contents:
“... Workshop: Regulation, Artificial Intelligence, and Formal Verification -- An Email a Day Could Give Your Health Data Away -- Explanation of Black Box AI for GDPR related Privacy using Isabelle -- Secure Internet Exams Despite Coercion -- DPM Workshop: Leakage...”2023
Full text
8
Abie, Habtamu
2023
Table of Contents:
“... Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council...”2023
Full text
9
Adams, Carlisle
2023
Table of Contents:
“... Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against...”2023
Full text
10
Batina, Lejla
2023
Table of Contents:
“... Cryptographic Implementation -- cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption -- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers -- Effcient Arithmetic for Polynomial Multiplication...”2023
Full text
11
Kavun, Elif Bilge
2023
Table of Contents:
“... McEliece -- Analyses and Tools -- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study -- Whiteboxgrind - Automated Analysis of Whitebox Cryptography -- White-box cryptography with global device binding from message recoverable...”2023
Full text
12
El Hajji, Said
2023
Table of Contents:
“... S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice...”2023
Full text
13
Ryan, Peter Y.A.
2022
Table of Contents:
“... -- Limitations of the Use of Neural Networks in Black Box Cryptanalysis -- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime -- An optimization of Bleichenbacher s Oracle Padding Attack -- UC Analysis...”2022
Full text
14
Adepu, Sridhar
2022
Table of Contents:
“... Collaborative -- Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture -- AIHWS - Artificial Intelligence in Hardware Security -- On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection -- S-box Pooling...”2022
Full text
15
Avsar, Cem
2022
Table of Contents:
“... technique using Logistic Map and 2D-TCLM -- Learning Co-occurrence Embeddings for Sentence Classification -- Preventing Fault Attacks on S-boxes of AES-like Block Ciphers -- Privacy Preserving of Two Local Data Sites using Global Random Forest Classification...”2022
Full text
16
Easttom, William
2022
Table of Contents:
“... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...”2022
Full text
17
Batina, Lejla
2022
Table of Contents:
“...Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation...”2022
Full text
18
Easttom, William
2021
Table of Contents:
“... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...”2021
Full text
19
Canteaut, Anne
2021
Table of Contents:
“... -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non...”2021
Full text
20
Canteaut, Anne
2021
Table of Contents:
“... for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power...”2021
Full text