1
Selected Areas in Cryptography - SAC 2023 [E-Book] : 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers /
Table of Contents: ...Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities -- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH -- Improving the Rectangle Attack on GIFT...

Full text 
2
Introduction to Cybersecurity [E-Book] : A Multidisciplinary Challenge /
Table of Contents: .... Network Security -- Chapter 9. Security in operating systems -- Chapter 10. Software security -- Chapter 11. Incident handling and system availability -- Chapter 12. Law and ethics -- Epilogue -- Appendix A. What's in the box? -- Appendix B. Mathematics...

Full text 
3
Implementation and Analysis of Ciphers in Quantum Computing [E-Book] /
Table of Contents: ...Introduction: Emergence of Quantum Computing -- Quantum Computing Fundamental and Cryptographic Perspective -- Reversible S-box Implementation with LIGHTER-R -- Quantum Implementation and Resource Estimate for RECTANGLE and KNOT -- Quantum Implementation...

Full text 
4
Information Security Practice and Experience [E-Book] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings /
Table of Contents: ... Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User's Vicinity -- BAHS: a...

Full text 
5
Progress in Cryptology - AFRICACRYPT 2023 [E-Book] : 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings /
Table of Contents: ... -- Theory -- Impossibilities in Succinct Arguments: Black-box Extraction and More -- Applications of Timed-release Encryption with Implicit Authentication....

Full text 
6
Security and Privacy in Communication Networks [E-Book] : 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings /
Table of Contents: ...: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge...

Full text 
7
Data Privacy Management, Cryptocurrencies and Blockchain Technology [E-Book] : ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers /
Table of Contents: ... Workshop: Regulation, Artificial Intelligence, and Formal Verification -- An Email a Day Could Give Your Health Data Away -- Explanation of Black Box AI for GDPR related Privacy using Isabelle -- Secure Internet Exams Despite Coercion -- DPM Workshop: Leakage...

Full text 
8
Computer Security. ESORICS 2022 International Workshops [E-Book] : CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers /
Table of Contents: ... Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council...

Full text 
9
Foundations and Practice of Security [E-Book] : 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers /
Table of Contents: ... Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against...

Full text 
10
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings /
Table of Contents: ... Cryptographic Implementation -- cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption -- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers -- Effcient Arithmetic for Polynomial Multiplication...

Full text 
11
Constructive Side-Channel Analysis and Secure Design [E-Book] : 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings /
Table of Contents: ... McEliece -- Analyses and Tools -- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study -- Whiteboxgrind - Automated Analysis of Whitebox Cryptography -- White-box cryptography with global device binding from message recoverable...

Full text 
12
Codes, Cryptology and Information Security [E-Book] : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings /
Table of Contents: ... S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice...

Full text 
13
Innovative Security Solutions for Information Technology and Communications [E-Book] : 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers /
Table of Contents: ... -- Limitations of the Use of Neural Networks in Black Box Cryptanalysis -- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime -- An optimization of Bleichenbacher s Oracle Padding Attack -- UC Analysis...

Full text 
14
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings /
Table of Contents: ... Collaborative -- Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture -- AIHWS - Artificial Intelligence in Hardware Security -- On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection -- S-box Pooling...

Full text 
15
Cyber Warfare, Security and Space Research : First International Conference, SpacSec 2021, Jaipur, India, December 9-10, 2021, Revised Selected Papers [E-Book]/
Avsar, Cem
2022
Table of Contents: ... technique using Logistic Map and 2D-TCLM -- Learning Co-occurrence Embeddings for Sentence Classification -- Preventing Fault Attacks on S-boxes of AES-like Block Ciphers -- Privacy Preserving of Two Local Data Sites using Global Random Forest Classification...

Full text 
16
Modern Cryptography [E-Book] : Applied Mathematics for Encryption and Information Security /
Table of Contents: ... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...

Full text 
17
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings /
Table of Contents: ...Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation...

Full text 
18
Modern Cryptography [E-Book] : Applied Mathematics for Encryption and Information Security /
Table of Contents: ... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...

Full text 
19
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part III /
Table of Contents: ... -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non...

Full text 
20
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II /
Table of Contents: ... for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power...

Full text