1
2
De, Aloknath
2021
Table of Contents:
“... Technology in 6G -- Post-quantum Cryptography in 6G -- 6G: Open Issues and Concluding Remarks....”2021
Full text
3
Debnath, Sumit Kumar
2021
Table of Contents:
“...Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques...”2021
Full text
4
Bajpai, Manish Kumar
2021
Table of Contents:
“... and Social Network Analysis -- Chapter 12: Natural Language Processing -- Chapter 13: Cryptography and Image Security....”2021
Full text
5
Lee, Chia-Wei
2021
Table of Contents:
“...Applied Cryptography for Big Data -- Big Data System Security -- Forensics in Social Networks and Big Data -- Privacy Protection in Social Networks -- Security and Privacy in Big Database -- Security of AI -- Trust and Reputations in Social Networks....”2021
Full text
6
Boumerdassi, Selma
2021
Table of Contents:
“... -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications...”2021
Full text
7
8
Liardet, Pierre-Yvan
2021
Table of Contents:
“...Post-Quantum Cryptography -- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime -- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers -- Classic McEliece Implementation with Low Memory Footprint -- Efficient...”2021
Full text
9
10
11
Maimut, Diana
2021
Table of Contents:
“... on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must...”2021
Full text
12
Asplund, Mikael
2021
Table of Contents:
“... cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms...”2021
Full text
13
14
15
Sako, Kazue
2021
Table of Contents:
“... -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance...”2021
Full text
16
Cheon, Jung Hee
2021
Table of Contents:
“...Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems...”2021
Full text
17
Dunkelman, Orr
2021
Table of Contents:
“...Public-key Cryptography -- Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments -- FROST: Flexible Round-Optimized Schnorr Threshold Signatures -- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled...”2021
Full text
18
Ardito, Carmelo
2021
Table of Contents:
“...Lattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory...”2021
Full text
19
20