New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming
|
2021 |
Baksi, Anubhab |
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players
|
2021 |
Manabe, Yoshifumi |
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management
|
2021 |
Panait, Andreea-Elena |
Secure Speaker Recognition System Using Homomorphic Encryption
|
2021 |
Chindris, Mihai-Cristian |
Reliable RFID Offline Privacy
|
2021 |
Hristea, Cristian |
Off-the-Shelf Security Testing Platform for Contactless Systems
|
2021 |
Liu, Yuanzhen |
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k -Residuosity Assumption
|
2021 |
Maimut, Diana |
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM
|
2021 |
Chhhou, Tung |
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots
|
2021 |
Almohamade, Shurook S. |
Card-Based Covert Lotter
|
2021 |
Shinoda, Yuto |
Elementary Attestation of Cryptographically Useful Composite Moduli
|
2021 |
Géraud-Stewart, Rémi |
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
|
2021 |
Mina, Mihai-Zicu |
Approach to Cryptography from Differential Geometry with Example
|
2021 |
Nagano, Tetsuya |
Virtualization and Automation for Cybersecurity Training and Experimentation
|
2021 |
Bica, lon |
Security Analysis Using Subjective Attack Trees. Oren
|
2021 |
Al-Hadhrami, Nasser |
Decentralized Multi-authority Anonymous Credential System with Bundledd Languages on Identifiers
|
2021 |
Anada, Hiroaki |
Manager Asks: Which Vulnerability Must be Eliminated First?.
|
2021 |
Pecl, David |
Hardware-Accelerated Cryptography for Software-Defined Networks withP4
|
2021 |
Cibik,, Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter |
Long-Term Secure Deniable Group Key Establishment
|
2021 |
Neupane, Kashi |