Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
|
2023 |
Mukhopadhyay, Madhurima |
Localhost Detour from Public to Private Networks
|
2023 |
Afek, Yehuda |
On Distributed Randomness Generation in Blockchains
|
2023 |
Komargodski, Ilan |
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks
|
2023 |
Longari, Stefano |
The Use of Performance-Countersto Perform Side-Channel Attacks
|
2023 |
Segev, Ron |
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
|
2023 |
Tan, Jiayi |
Practical Improvements on BKZ Algorithm
|
2023 |
Zhao, Ziyu |
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs
|
2023 |
Nair, Madhav |
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks
|
2023 |
Longari, Stefano |
A New Interpretation for the GHASH Authenticator of AES-GCM
|
2023 |
Gueron, Shay |
Deep Neural Networks for Encrypted Inference with TFHE
|
2023 |
Stoian, Andrei |
Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages
|
2023 |
Miranda, Lucas |
Efficient Skip Connections Realization for Secure Inference on Encrypted Data
|
2023 |
Drucker, Nir |
Efficient Extended GCD and Class Groups from Secure Integer Arithmetic
|
2023 |
Schoenmakers, Berry |
Single Instance Self–masking via Permutations
|
2023 |
Cohen, Asaf |
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
|
2023 |
Samajder, Subhabrata |
On Adaptively Secure Prefix Encryption Under LWE
|
2023 |
Zirdelis, Giorgos |
Midgame Attacks and Defense Against Them
|
2023 |
Chang, Donghoon |
Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks
|
2023 |
Kumar, Rajnish |
Building Blocks for LSTM Homomorphic Evaluation with TFHE
|
2023 |
Trama, Daphné |