Secure and Networked Systems
1 – 10 of 74
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2026
-
Mark
Attacking Single-Cycle Ciphers on Modern FPGAs : Featuring Explainable Deep Learning
(2026) Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025 In Lecture Notes in Computer Science 15653 LNCS. p.22-39
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Single-Trace Key Recovery Attacks on HQC Using Valid and Invalid Ciphertexts
(2026)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles
(2026)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Modeling for Substitution Boxes with Negative Samples and Beyond
(2026) 26th International Conference on Cryptology in India, INDOCRYPT 2025 In Lecture Notes in Computer Science 16372 LNCS. p.45-69
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Dynamic multi-layer Aerial system for latent diffusion-based Generative AI Inference at the Edge
- Contribution to journal › Article
-
Mark
Lightweight personalisation for MEMS-based wearables : a padel stroke recognition case study
(2026)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Age of information in relativistic communication systems
(2026)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards calibration robust: : 6DoF multi-horizon head motion prediction for EdgeXR
(2026) 2026 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)
- Contribution to conference › Paper, not in proceeding
- 2025
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Trust Establishment and Key Management Architecture for Hospital-at-Home
- Contribution to journal › Article
