Automatic Search of Linear Structure: Applications to Keccak and Ascon

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Information Security and Cryptology (19. : 2023 : Hangzhou) Information security and cryptology ; Part 2
1. Verfasser: Li, Huina (VerfasserIn)
Weitere Verfasser: Liu, Guozhen (VerfasserIn), Zhang, Haochen (VerfasserIn), Tang, Peng (VerfasserIn), Qiu, Weidong (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models 2024 Jiang, Yi
An Android Malware Detection Method Using Better API Contextual Information 2024 Yang, Hongyu
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations 2024 Chen, Dong
TIA: Token Importance Transferable Attack on Vision Transformers 2024 Fu, Tingchao
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 2024 Xu, Zhichao
Automatic Search of Linear Structure: Applications to Keccak and Ascon 2024 Li, Huina
Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm 2024 Yu, Bo
Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments 2024 Tu, Peiyi
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method 2024 Zhao, Changzhi
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture 2024 Gao, Qingguan
Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound 2024 Cheng, Qingfeng
Non-malleable Codes from Leakage Resilient Cryptographic Primitives 2024 Ghosal, Anit Kumar
Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis 2024 Yang, Zhen
A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles 2024 Sun, Xin
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search 2024 Yang, Husheng
TRGE: A Backdoor Detection After Quantization 2024 Xie, Renhua
Improved Homomorphic Evaluation for Hash Function Based on TFHE 2024 Wei, Benqiang
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra 2024 Guo, Yi
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 2024 Zhang, Zhuolong
Quantum Augmented Lattice Attack on NTRU with Side Information 2024 Cheng, Qingfeng
Alle Artikel auflisten