A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments
|
2023 |
Ahmad, Hussain |
Forecasting Click Fraud via Machine Learning Algorithms
|
2023 |
Sahllal, Nadir |
Security Enhancement Method Using Shortened Error Correcting Codes
|
2023 |
Sekiguchi, Tomohiro |
An Updated Database of ℤ4 Codes and an Open Problem About Quasi-cyclic Codes
|
2023 |
Aydin, Nuh |
Cryptologists Should Not Ignore the History of Al-Andalusia
|
2023 |
Desmedt, Yvo |
QCB is Blindly Unforgeable
|
2023 |
Leuther, Jannis |
Computational Results on Gowers U2 and U3 Norms of Known S-Boxes
|
2023 |
Kumar, Vikas |
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher
|
2023 |
Nandi, Mridul |
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes
|
2023 |
Chartouny, Maya |
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas
|
2023 |
Kelesidis, Evgnosia-Alexandra |
Weightwise Perfectly Balanced Functions and Nonlinearity
|
2023 |
Gini, Agnese |
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the PKP, SD and RSD Problems
|
2023 |
Bidoux, Loïc |
On Catalan Constant Continued Fractions
|
2023 |
Naccache, David |
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
|
2023 |
Wang, Ruize |
Attack on a Code-Based Signature Scheme from QC-LDPC Codes
|
2023 |
Prabowo, Theo Fanuela |
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments
|
2023 |
Phung, Ngoc Minh |
A Study for Security of Visual Cryptography
|
2023 |
Thai, Binh Le Thanh |
An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS
|
2023 |
Idrissi, Hind |
Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pⁿ
|
2023 |
Edemskiy, Vladimir |
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
|
2023 |
McLoughlin, Callum |