Networks and Security
21 – 30 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
2024) 24th Privacy Enhancing Technologies Symposium, PETS 2024 In Proceedings on Privacy Enhancing Technologies 2024(1). p.330-342(
- Contribution to journal › Article
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
(
- Contribution to journal › Article
-
Mark
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LightFF: Lightweight Inference for Forward-Forward Algorithm
2024) 27th European Conference on Artificial Intelligence, ECAI-2024 In Frontiers in Artificial Intelligence and Applications 392. p.1728-1735(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
(
- Contribution to journal › Article
-
Mark
CCA Security with Short AEAD Tags
(
- Contribution to journal › Article
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
(
- Contribution to journal › Article