61
An Introduction to Secret Sharing [E-Book] : A Systematic Overview and Guide for Protocol Selection /
62
NASA Formal Methods [E-Book] : 15th International Symposium, NFM 2023, Houston, TX, USA, May 16-18, 2023, Proceedings /
Table of Contents: ...: From the Standards to Silicon -- Formalising Liveness Properties in Event-B with the Reflexive EB4EB Framework -- Formalized High Level Synthesis with Applications to Cryptographic Hardware -- From Natural Language Requirements to the Verification...

Full text 
63
Information Security and Privacy [E-Book] : 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings /
Table of Contents: ... Generic Composition: the modes A10, A11 and A12 are insecure -- Exploring Formal Methods for Cryptographic Hash FunctionImplementations -- Public-Key Cryptography -- A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM -- Compact Password...

Full text 
64
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings /
Table of Contents: ... Cryptographic Implementation -- cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption -- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers -- Effcient Arithmetic for Polynomial Multiplication...

Full text 
65
Provable and Practical Security [E-Book] : 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings /
Au, Man Ho
2023
Table of Contents: ...Fundamentals & Cryptographic Primitives -- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement -- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation...

Full text 
66
Information and Communications Security [E-Book] : 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings /
Table of Contents: ... Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious...

Full text 
67
Information Security Practice and Experience [E-Book] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings /
Table of Contents: ... Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source...

Full text 
68
Telematics and Computing [E-Book] : 12th International Congress, WITCOM 2023, Puerto Vallarta, Mexico, November 13-17, 2023, Proceedings /
Table of Contents: ... in the classification of vertebral column diseases -- Security Verification on Instant Messaging Cryptographic Protocols -- Elaboration of an information system to improve operational discipline in PEMEX with LAGS Methodology. -- ICIS: a model for context-based...

Full text 
69
Security and Trust Management [E-Book] : 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings /
70
Topics in Cryptology - CT-RSA 2023 [E-Book] : Cryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings /
Table of Contents: ...Cryptographic Implementations -- Quantum Cryptanalysis -- Advanced Public-Key Encryption -- Tools for Privacy-Enhancing Technologies -- Symmetric Cryptanalysis -- Multiparty Protocols -- Digital Signatures -- Fault Attacks and Side Channels -- Heuristic...

Full text 
71
Wireless Internet [E-Book] : 15th EAI International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings /
Table of Contents: ...Security and Privacy -- Preventing Adversarial Attacks on Autonomous Driving Models -- Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function -- Trust-based Communities for Smart Grid Security and Privacy -- Decentralized...

Full text 
72
Classical and Modern Cryptography for Beginners [E-Book] /
73
Code-Based Cryptography [E-Book] : 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers /
74
Cryptology and Network Security [E-Book] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings /
Deng, Jing
2023
Table of Contents: ... Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application...

Full text 
75
Hardware Security Primitives [E-Book] /
Table of Contents: ... -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware...

Full text 
76
IoT Based Control Networks and Intelligent Systems [E-Book] : Proceedings of 3rd ICICNIS 2022 /
Table of Contents: ... -- Analysis of Different Cryptographic Algorithms in Cloud-based Multi-Robot Systems -- An IoT Based Environment Monitoring & Controlling System for Food Grain Warehouse -- Numerical Analysis and ANN Modeling of the Intercooled, Reheat and Regenerative Gas Turbine...

Full text 
77
International Conference on Innovative Computing and Communications [E-Book] : Proceedings of ICICC 2023, Volume 1 /
Table of Contents: ... Cryptographic Hash and Encryption/Decryption through MapReduce programming Model -- 5G Wireless network based cyber security analysis using software defined Phy_HetNets and Boltzmann encoder convolutional basis neural network....

Full text 
78
Secure Automatic Dependent Surveillance-Broadcast Systems [E-Book] /
Table of Contents: ... Authentication Using IBS-MR -- Practical and Compatible Cryptographic Solution to ADS-B Security -- Enable Aircraft Location Verification for Industrial ADS-B -- Future Research Directions -- Conclusion....

Full text 
79
Emerging Trends in Expert Applications and Security [E-Book] : Proceedings of 2nd ICETEAS 2023, Volume 2 /
80
A Nature-Inspired Approach to Cryptology [E-Book] /