Attack on the Common Prime Version of Murru and Saettone’s RSA Cryptosystem
|
2022 |
Zhang, Xiaona |
Identification of Data Breaches from Public Forums
|
2022 |
Adnan, Akhtaruzzaman |
A Forensic Framework for Webmail Threat Detection Using Log Analysis
|
2022 |
Malik, Abdul Saboor |
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime
|
2022 |
Yeniaras, Esra |
Limitations of the Use of Neural Networks in Black Box Cryptanalysis
|
2022 |
Bellini, Emanuele |
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers
|
2022 |
Franck, Christian |
Using Five Cards to Encode Each Integer in Z/6Z
|
2022 |
Ruangwises, Suthee |
UC Analysis of the Randomized McEliece Cry vivsy tem
|
2022 |
Zentai, Daniel |
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things
|
2022 |
Duan, Li |
A Multifunctional Modular Implementation of Grover’s Algorithm
|
2022 |
Mina, Mihai-Zicu |
Long-Term Secure Asymmetric Group Key Agreement
|
2022 |
Neupane, Kashi |
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing
|
2022 |
Gusatu, Edge Marian |
Building Deobfuscated Applications from Polymorphic Binaries
|
2022 |
Crǎciun, Vlad Constantin |
Viruses, Exploits, Malware and Security Issues on IoT Devices
|
2022 |
Toma, Cristian |
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations
|
2022 |
Santos, Luan Cardoso dos |
Lightweight Swarm Authentication
|
2022 |
Teseleanu, George |
New Configurations of Grain Ciphers: Security Against Slide Attacks
|
2022 |
Maimut, Diana |
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch
|
2022 |
Brisse, Romain |
ADAM: Automatic Detection of Android Malware
|
2022 |
Tripathy, Somanath |
An Optimization of Bleichenbacher’s Oracle Padding Attack
|
2022 |
Kelesidis, Evegenosia-Alexandra |