21 – 30 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
- Contribution to journal › Article
-
Mark
Cybersecurity Education in Universities : A Comprehensive Guide to Curriculum Development
- Contribution to journal › Article
-
Mark
Resilient Cloud Control System: Dynamic Frequency Adaptation via Q-learning
(2024) 27th Conference on Innovation in Clouds, Internet and Networks, ICIN
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Regaining Dominance in CIDER and Lazarus
- Contribution to journal › Article
-
Mark
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
(2024) 24th Privacy Enhancing Technologies Symposium, PETS 2024 In Proceedings on Privacy Enhancing Technologies 2024(1). p.330-342
- Contribution to journal › Article
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
- Contribution to journal › Article
-
Mark
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
(2024)
- Thesis › Licentiate thesis
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
(2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
- Contribution to journal › Article
