Long-term Availability of Crypto Currencies: Security and Privacy Against Quantum-Attacks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (19. : 2021 : Online) Applied cryptography and network security workshops
1. Verfasser: Sakurai, Kouichi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis 2021 Wu, Lichao
Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment 2021 Yoshida, Kota
Quantum Computing Threat Modelling on a Generic CPS Setup 2021 Lee, Cher Chye
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps 2021 Kharitonov, Aleksei
BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud? 2021 Clet, Pierre-Emmanuel
An Efficient Proactive Secret Sharing Scheme for Cloud Storage 2021 Zhang, Shuihai
Towards Demystifying Adversarial Robustness of Binarized Neural Networks 2021 Qin, Zihao
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures 2021 Ishii, Ryu
POSTER: LHSA: Lightweight Hardware Security Arbitrator 2021 Kim, Yongjin
Long-term Availability of Crypto Currencies: Security and Privacy Against Quantum-Attacks 2021 Sakurai, Kouichi
The Obfuscation Method of User Identification System 2021 Xu, Jing
Proof of Assets in the Diem Blockchain 2021 Chatzigiannis, Panagiotis
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning 2021 Chakraborty, Anirban
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security 2021 Zhang, Yanhua
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography 2021 Chen, Niusen
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass 2021 Diop, Aïda
Kryptonite: An Adversarial Attack Using Regional Focus 2021 Kulkarni, Yogesh
On Reverse Engineering Neural Network Implementation on GPU 2021 Chmielewski, Łukasz
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain 2021 Ghosh, Soumyadyuti
Memory Deduplication as a Protective Factor in Virtualized Systems 2021 Albalawi, Abdullah
Alle Artikel auflisten