Fooling Primality Tests on Smartcards

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Sedlacek, Vladimir (VerfasserIn)
Weitere Verfasser: Jancar, Jan (VerfasserIn), Svenda, Petr (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Linear Attack on Round-Reduced DES Using Deep Learning 2020 Hou, Botao
Detection by Attack: Detecting Adversarial Samples by Undercover Attack 2020 Zhou, Qifei
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA 2020 Aparicio-Sánchez, Damián
On the Privacy Risks of Compromised Trigger-Action Platforms 2020 Chiang, Yu-Hsi
Certifying Decision Trees Against Evasion Attacks by Program Analysis 2020 Calzavara, Stefano
Understanding Object Detection Through an Adversarial Lens 2020 Chow, Ka-Ho
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE 2020 Costache, Anamaria
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain 2020 Sun, Hanyi
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC 2020 Dalskov, Anders
On Private Information Retrieval Supporting Range Queries 2020 Hayata, Junichiro
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval 2020 Park, Jeongeun
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces 2020 Urban, Tobias
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory 2020 Zhang, Zhuoran
Signatures with Tight Multi-user Security from Search Assumptions 2020 Pan, Jiaxin
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit 2020 Kurt, Ahmet
Generic Superlight Client for Permissionless Blockchains 2020 Lu, Yuan
Hardware Fingerprinting for the ARINC 429 Avionic Bus 2020 Gilboa-Markevich, Nimrod
Alle Artikel auflisten