Building Blocks for LSTM Homomorphic Evaluation with TFHE
|
2023 |
Trama, Daphné |
Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel
|
2023 |
Novick, Deborah |
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO
|
2023 |
Vershinin, George |
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image
|
2023 |
Jena, Riyanka |
New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic
|
2023 |
Korzilius, Stan |
Improving Performance in Space-Hard Algorithms
|
2023 |
Güner, Hatice Kübra |
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All the Way to the Rescue!
|
2023 |
Dolev, Shlomi |
A Survey of Security Challenges in Automatic Identification System (AIS) Protocol
|
2023 |
Levy, Silvie |
Efficient Skip Connections Realization for Secure Inference on Encrypted Data
|
2023 |
Drucker, Nir |
Efficient Extended GCD and Class Groups from Secure Integer Arithmetic
|
2023 |
Schoenmakers, Berry |
Single Instance Self–masking via Permutations
|
2023 |
Cohen, Asaf |
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
|
2023 |
Samajder, Subhabrata |
On Adaptively Secure Prefix Encryption Under LWE
|
2023 |
Zirdelis, Giorgos |
Midgame Attacks and Defense Against Them
|
2023 |
Chang, Donghoon |
Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks
|
2023 |
Kumar, Rajnish |
Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
|
2023 |
Mukhopadhyay, Madhurima |
Localhost Detour from Public to Private Networks
|
2023 |
Afek, Yehuda |
On Distributed Randomness Generation in Blockchains
|
2023 |
Komargodski, Ilan |
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks
|
2023 |
Longari, Stefano |
The Use of Performance-Countersto Perform Side-Channel Attacks
|
2023 |
Segev, Ron |