141
142
143
145
146
Aly, Abdelrahaman
2023
Table of Contents:
“...Symmetric-Key Cryptography -- On the Algebraic Immunity of Weightwise Perfectly Balanced Functions -- ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for High-order Avalanche Tests -- Multi-Party Computation -- On Fully-Secure...”2023
Full text
147
148
Table of Contents:
“... without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical...”
Full text
Full text
149
Table of Contents:
“... Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round...”
Full text
Full text
150
151
152
153
154
155
156
Chen, Xiaofeng
2023
Table of Contents:
“...Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic...”2023
Full text
157
Rawal, Bharat S.
2023
Table of Contents:
“...Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets...”2023
Full text
158
159
160