Networks and Security
21 – 30 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
- Contribution to journal › Article
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
- Contribution to journal › Article
-
Mark
LightFF: Lightweight Inference for Forward-Forward Algorithm
(2024) 27th European Conference on Artificial Intelligence, ECAI-2024 In Frontiers in Artificial Intelligence and Applications 392. p.1728-1735
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
(2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
- Contribution to journal › Article
-
Mark
A New Sieving-style Information-set Decoding Algorithm
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
- Contribution to journal › Article
-
Mark
Cybersecurity Education in Universities : A Comprehensive Guide to Curriculum Development
- Contribution to journal › Article
-
Mark
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
(2024)
- Thesis › Licentiate thesis
