Networks and Security
31 – 40 of 239
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article