Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
|
2023 |
Alsahli, Malik |
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
|
2023 |
Dutta, Subhranil |
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
|
2023 |
Ka, Ahmad Khoureich |
MILP-Aided Cryptanalysis of the FUTURE Block Cipher
|
2023 |
llter, Murat Burhan |
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments
|
2023 |
Medkovda, Jana |
Superpoly Recovery of Grain-128AEAD Using Division Property
|
2023 |
Chakraborty, Debasmita |
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input
|
2023 |
Kitai, Hiromasa |
Towards Verifying Physical Assumption in Card-Based Cryptography
|
2023 |
Shimano, Masahisa |
Interactional Freedom and Cybersecurity
|
2023 |
Bella, Giampaolo |
Bridges Connecting Encryption Schemes
|
2023 |
Barcau, Mugurel |
On Single-Server Delegation of RSA
|
2023 |
Crescenzo, Giovanni Di |
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
|
2023 |
Hamidi, Amirreza |
Statistical Tests for Symmetric Primitives: An Application to NIST Lightweight Finalists
|
2023 |
Bellini, Emanuele |
Activity Detection from Encrypted Remote Desktop Protocol Traffic
|
2023 |
Lapczyk, Lukasz |
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function
|
2023 |
Komano, Yuichi |
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
|
2023 |
Komano, Yuichi |
AI-Powered Vulnerability Detection for Secure Source Code Development
|
2023 |
Rajapaksha, Sampath |
The Security of Quasigroups Based Substitution Permutation Networks
|
2023 |
Teseleanu, George |
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures
|
2023 |
Ishibashi, lakuya |