11 – 20 of 60
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Robustness and Privacy Interplay in Patient Membership Inference
(2025)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Formal Local Implication Between Two Neural Networks
(2025)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
- Contribution to journal › Article
-
Mark
CyberROAD : a cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:2021
- Contribution to journal › Article
-
Mark
A BKW-Style Solver for the Restricted Syndrome Decoding Problem
(2025)
- Other contribution › Miscellaneous
-
Mark
Formal Analysis of Julia Key Agreement Protocol
(2025) 26th International Conference on Information and Communications Security, ICICS 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15057 LNCS. p.171-190
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Principles and Solutions for Improved Availability and Code Vulnerability Detection
(2025)
- Thesis › Doctoral thesis (compilation)
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
(2025) 10th IEEE European Symposium on Security and Privacy, Euro S and P
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Code-based Cryptography: Attacking and Constructing Cryptographic Systems
(2025) In Series of licentiate and doctoral theses
- Thesis › Doctoral thesis (compilation)
-
Mark
Binary Forward-Only Algorithms
- Contribution to journal › Article
