101
Applied Cryptography in Computer and Communications [E-Book] : Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
Table of Contents: ...Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented...

Full text 
102
Applied Cryptography  and Network Security [E-Book] : 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings /
Table of Contents: ...Encryption -- Attacks -- Cryptographic Protocols -- System Security -- Cryptographic Primitives -- MPC -- Blockchain -- Block-Cyphers -- Post-Quantum Cryptography....

Full text 
103
Modern Cryptography [E-Book] : Applied Mathematics for Encryption and Information Security /
Table of Contents: ... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...

Full text 
104
Advances in Cryptology - EUROCRYPT 2022 [E-Book] : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III /
105
Information Security and Privacy [E-Book] : 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings /
Table of Contents: ... of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication...

Full text 
106
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings /
107
Topics in Cryptology - CT-RSA 2022 [E-Book] : Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings /
108
Public-Key Cryptography - PKC 2022 [E-Book] : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I /
Table of Contents: ... for SPDZ from Ring-LPN -- Fast Batched DPSS and its Applications -- CNF-FSS and its Applications -- Cryptographic Protocols -- Effcient Verifiable Partially-Decryptable Commitments from Lattices and Applications -- Making Private Function Evaluation Safer...

Full text 
109
Public-Key Cryptography - PKC 2022 [E-Book] : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II /
110
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings /
Table of Contents: ... Prevention FileSystem -- Privacy-preserving record linkage using local sensitive hash and private set intersection -- SCI - Secure Cryptographic Implementation -- UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election -- PEPEC...

Full text 
111
Information and Communication Technologies [E-Book] : 10th Ecuadorian Conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022, Proceedings /
Table of Contents: ... and Neuropathy using EMG signals and Neural Network Model -- Underwater wireless sensor networks and cryptographic applications -- Design of a sensor network for drinking water control in the Maria of Merced Educa-tional Unit -- Drinking water and sewerage...

Full text 
112
Cyber Warfare, Security and Space Research : First International Conference, SpacSec 2021, Jaipur, India, December 9-10, 2021, Revised Selected Papers [E-Book]/
Avsar, Cem
2022
Table of Contents: ...Creation of Novel Database for Knowledge Repository on Cyber Security -- Brain Tumour Classification via UNET Architecture of CNN Technique -- Analysis of Various ML algorithms for Intrusion Detection -- Enhanced Security Mechanism for Cryptographic File...

Full text 
113
Perfect Secrecy in IoT [E-Book] : A Hybrid Combinatorial-Boolean Approach /
Table of Contents: ...Introduction -- A Review on Perfect Secrecy -- Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments -- Cryptography in IoT -- Resilient functions -- Modeling a General Cryptographic Algorithm -- Latin Squares...

Full text 
114
Cyber Security, Cryptology, and Machine Learning [E-Book] : 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings /
Table of Contents: ... We Did It -- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum -- A Linear-Time 2-Party Secure Merge Protocol -- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control...

Full text 
115
Computer Security - ESORICS 2022 [E-Book] : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II /
Table of Contents: ... First-Order Temporal Logic -- A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing...

Full text 
116
Science of Cyber Security [E-Book] : 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers /
Liu, Feng
2022
Table of Contents: ... Semi-homomorphic Encryption, and the Extension to DOT -- Scalable M+1st-Price Auction with Infinite Bidding Price -- The Shared Memory based Cryptographic Card Virtualization -- Network Security -- Feature Transfer based Network Anomaly Detection -- Hybrid...

Full text 
117
Rewriting Logic and Its Applications : 14th International Workshop, WRLA 2022, Munich, Germany, April 2-3, 2022, Revised Selected Papers [E-Book] /
Table of Contents: ... for Cryptographic Protocol Analysis -- Maude as a Library: An Efficient All-Purpose Programming Interface....

Full text 
118
Innovative Security Solutions for Information Technology and Communications [E-Book] : 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers /
Table of Contents: ... from Public Forums -- A Forensic Framework for Webmail Threat Detection using Log Analysis -- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations -- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers...

Full text 
119
Cryptology and Network Security [E-Book] : 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings /
Table of Contents: ... for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh -- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Provable Security of HADES Structure -- Cryptographic Protocols -- Practical Single-pass Oblivious Aggregation...

Full text 
120
Selected Areas in Cryptography [E-Book] : 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers /