MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Küennemann, Robert (VerfasserIn)
Weitere Verfasser: Nemati, Hamed (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Hardware Fingerprinting for the ARINC 429 Avionic Bus 2020 Gilboa-Markevich, Nimrod
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems 2020 Aiolli, Fabio
Fooling Primality Tests on Smartcards 2020 Sedlacek, Vladimir
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs 2020 Chen, Xihui
Post-Quantum Adaptor Signatures and Payment Channel Networks 2020 Esgin, Muhammed F.
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution 2020 Xiao, Yang
Identity-Based Authenticated Encryption with Identity Confidentiality 2020 Zhao, Yunlei
Updatable Blockchains 2020 Ciampi, Michele
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely 2020 Duong, Tuyet
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Linear Attack on Round-Reduced DES Using Deep Learning 2020 Hou, Botao
Detection by Attack: Detecting Adversarial Samples by Undercover Attack 2020 Zhou, Qifei
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA 2020 Aparicio-Sánchez, Damián
On the Privacy Risks of Compromised Trigger-Action Platforms 2020 Chiang, Yu-Hsi
Certifying Decision Trees Against Evasion Attacks by Program Analysis 2020 Calzavara, Stefano
Understanding Object Detection Through an Adversarial Lens 2020 Chow, Ka-Ho
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE 2020 Costache, Anamaria
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain 2020 Sun, Hanyi
Alle Artikel auflisten