1
Carlet, Claude
2024
Table of Contents:
“... -- On the Precision Loss in Approximate Homomorphic Encryption -- Secure Function Extensions to Additively Homomorphic Cryptosystems -- Public-Key Cryptography -- Generalized Implicit Factorization Problem -- Differential Cryptanalysis -- CLAASP: a Cryptographic Library...”2024
Full text
2
3
Smith, Benjamin
2024
Table of Contents:
“... -- 2 Differential Cryptanalysis -- Key-Recovery Attacks on CRAFT and WARP -- Differential Analysis of the Ternary Hash Function Troika -- Another Look at Differential-Linear Attacks -- 3 Cryptographic Primitives -- Rank Metric Trapdoor Functions...”2024
Full text
4
Andreoni, Martin
2024
Table of Contents:
“... -- Evaluation of Lightweight Machine Learning-based NIDS Techniques for Industrial IoT -- Measuring Cyber Resilience of IoT-enabled Critical National Infrastructure -- SCI - Secure Cryptographic Implementation: Towards Discovering Quantum-Threats for Applications...”2024
Full text
5
6
Iliadis, Lazaros
2024
Table of Contents:
“... of Cryptographic Algorithms: Hints from Machine Learning....”2024
Full text
7
Arai, Kohei
2024
Table of Contents:
“... Data, Little People: A Case Study on Istanbul's Public Transport Data -- Educommunication as a Communicative Strategy for the Dissemination of Cultural Programs -- On Implemented Graph-based Generator of Cryptographically Strong Pseudorandom Sequences...”2024
Full text
8
Balachandran, K.
2024
Table of Contents:
“... Asymmetric Bio-Cryptographic Key Generation Using Convolution Network -- 4. Comparison of Brain Tumor Detection Techniques by Using Different Machine Learning YOLO Algorithms -- 5. Media Steganography Using CNN With Blockchain Enabled Secure File Transfer -- 6...”2024
Full text
9
10
11
Table of Contents:
“... of Matrix code based Signature Schemes -- Group-Action-Based Cryptography -- CCA Secure Updatable Encryption from Non Mappable Group Actions -- Properties of Lattice Isomorphism as a Cryptographic Group Action -- A Subexponential Quantum Algorithm...”
Full text
Full text
12
13
14
Ahmed, Toufik
2024
Table of Contents:
“... to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT...”2024
Full text
15
16
17
18
Ge, Chunpeng
2024
Table of Contents:
“... Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy...”2024
Full text
19
20
Conti, Mauro
2024
Table of Contents:
“...Ten Myths About Blockchain Consensus -- Cryptographic Primitives in Blockchain -- Bitcoin Blockchain System: An Overview of Security and Privacy Aspects -- The Ethereum Blockchain: Implementation and Security Aspects -- The Future Ring Confidential...”2024
Full text