Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
|
2023 |
Mukhopadhyay, Madhurima |
Localhost Detour from Public to Private Networks
|
2023 |
Afek, Yehuda |
On Distributed Randomness Generation in Blockchains
|
2023 |
Komargodski, Ilan |
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks
|
2023 |
Longari, Stefano |
The Use of Performance-Countersto Perform Side-Channel Attacks
|
2023 |
Segev, Ron |
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
|
2023 |
Tan, Jiayi |
Practical Improvements on BKZ Algorithm
|
2023 |
Zhao, Ziyu |
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs
|
2023 |
Nair, Madhav |
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks
|
2023 |
Longari, Stefano |
A New Interpretation for the GHASH Authenticator of AES-GCM
|
2023 |
Gueron, Shay |
Deep Neural Networks for Encrypted Inference with TFHE
|
2023 |
Stoian, Andrei |
Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages
|
2023 |
Miranda, Lucas |
Building Blocks for LSTM Homomorphic Evaluation with TFHE
|
2023 |
Trama, Daphné |
Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel
|
2023 |
Novick, Deborah |
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO
|
2023 |
Vershinin, George |
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image
|
2023 |
Jena, Riyanka |
New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic
|
2023 |
Korzilius, Stan |
Improving Performance in Space-Hard Algorithms
|
2023 |
Güner, Hatice Kübra |
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All the Way to the Rescue!
|
2023 |
Dolev, Shlomi |
A Survey of Security Challenges in Automatic Identification System (AIS) Protocol
|
2023 |
Levy, Silvie |