Conditional Cube Attacks on Full Members of KNOT-AEAD Family

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICICS (24. : 2022 : Canterbury) Information and communications security
1. Verfasser: Chen, Siwei (VerfasserIn)
Weitere Verfasser: Xiang, Zejun (VerfasserIn), Zeng, Xiangyong (VerfasserIn), Zhang, Shasha (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
New Results of Breaking the CLS Scheme from ACM-CCS 2014 2022 Gao, Jing
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices 2022 Tan, Teik Guan
A Note on the Security Framework of Two-key DbHtS MACs 2022 Guo, Tingting
Fast Fourier Orthogonalization over NTRU Lattices 2022 Sun, Shuo
Tight Analysis of Decryption Failure Probability of Kyber in Reality 2022 Fang, Boyue
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal 2022 Sciancalepore, Savio
Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids 2022 Alromih, Arwa
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud 2022 Li, Meng
Secure Boolean Masking of Gimli: Optimization and Evaluation on the Cortex-M4 2022 Chang, Tzu-Hsien
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection 2022 Peng, Hongyi
Study on the Effect of Face Masks on Forensic Speaker Recognition 2022 Bogdanel, Georgiana
Video Forensics for Object Removal Based on Darknet3D 2022 Zhang, Kejun
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study 2022 Chen, Kaini
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On System 2022 Tolbert, Matthew M.
Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises 2022 Suzuki, Makoto Yuito. Kenta
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection 2022 Xia, Fengliang
FN2: Fake News DetectioN Based on Textual and Contextual Features 2022 Rabhi, Mouna
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach 2022 Liu, Mingchang
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining 2022 Mamun, Mohammad
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation 2022 Oiu, Zhi
Alle Artikel auflisten