×

Found 2,792 Documents (Results 1–100)

Information security and cryptology – ICISC 2023. 26th international conference on information security and cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023. Revised selected papers. Part II. (English) Zbl 07815696

Lecture Notes in Computer Science 14562. Singapore: Springer (ISBN 978-981-971237-3/pbk; 978-981-971238-0/ebook). xiv, 308 p. (2024).
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology – ICISC 2023. 26th international conference on information security and cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023. Revised selected papers. Part I. (English) Zbl 07815695

Lecture Notes in Computer Science 14561. Singapore: Springer (ISBN 978-981-971234-2/pbk; 978-981-971235-9/ebook). xiv, 326 p. (2024).
PDFBibTeX XMLCite
Full Text: DOI

Securing machine learning models: notions and open issues. (English) Zbl 07787158

Kunze, Herb (ed.) et al., Engineering mathematics and artificial intelligence. Foundations, methods, and applications. Boca Raton, FL: CRC Press. Math. Appl.: Model. Engin. Soc. Sci., 485-508 (2024).
MSC:  68T05 68M25
PDFBibTeX XMLCite
Full Text: DOI

Information and communications security. 25th international conference, ICICS 2023, Tianjin, China, November 18–20, 2023. Proceedings. (English) Zbl 07826004

Lecture Notes in Computer Science 14252. Cham: Springer (ISBN 978-981-9973-55-2/pbk; 978-981-9973-56-9/ebook). xxv, 763 p. (2023).
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 22nd international conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023. Proceedings. (English) Zbl 07815729

Lecture Notes in Computer Science 14342. Singapore: Springer (ISBN 978-981-9975-62-4/pbk; 978-981-9975-63-1/ebook). xix, 590 p. (2023).
PDFBibTeX XMLCite
Full Text: DOI

Almost tight multi-user security under adaptive corruptions from LWE in the standard model. (English) Zbl 07800248

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 682-715 (2023).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with certified deletion. (English) Zbl 07800233

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 192-223 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

PAC privacy: automatic privacy measurement and control of data processing. (English) Zbl 07799235

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 611-644 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Best of both worlds. Revisiting the spymasters double agent problem. (English) Zbl 07799099

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 328-359 (2023).
MSC:  94A60 68N20 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new algebraic approach to the regular syndrome decoding problem and implications for PCG constructions. (English) Zbl 1528.94037

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 391-422 (2023).
PDFBibTeX XMLCite
Full Text: DOI HAL

Black-box reusable NISC with random oracles. (English) Zbl 07773983

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 68-97 (2023).
PDFBibTeX XMLCite
Full Text: DOI

EKE meets tight security in the universally composable framework. (English) Zbl 07770272

Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 685-713 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. 18th international workshop on security, IWSEC 2023, Yokohama, Japan, August 29–31, 2023. Proceedings. (English) Zbl 1527.68013

Lecture Notes in Computer Science 14128. Cham: Springer (ISBN 978-3-031-41325-4/pbk; 978-3-031-41326-1/ebook). xii, 274 p. (2023).
PDFBibTeX XMLCite
Full Text: DOI

RSA security implementation in quantum computing for a higher resilience. (English) Zbl 07767111

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 219-229 (2023).
PDFBibTeX XMLCite
Full Text: DOI

An improved genetic quantum cryptography model for network communication. (English) Zbl 07767108

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 177-192 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Review and significance of cryptography and machine learning in quantum computing. (English) Zbl 07767107

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 159-175 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Quantum transfer learning to detect passive attacks in SDN-IOT. (English) Zbl 07767102

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 79-95 (2023).
PDFBibTeX XMLCite
Full Text: DOI

IoT attack detection using quantum deep learning in large-scale networks. (English) Zbl 07767101

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 67-78 (2023).
PDFBibTeX XMLCite
Full Text: DOI

AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network. (English) Zbl 07767099

Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 37-47 (2023).
PDFBibTeX XMLCite
Full Text: DOI

A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments. (English) Zbl 07745632

El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 129-135 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Full Post-Quantum datagram TLS handshake in the Internet of Things. (English) Zbl 07745628

El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 57-76 (2023).
MSC:  68P25 68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Putting the online phase on a diet: covert security from short MACs. (English) Zbl 07745612

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 360-386 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Nostradamus goes quantum. (English) Zbl 07731556

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 583-613 (2023).
PDFBibTeX XMLCite
Full Text: DOI

State machine replication under changing network conditions. (English) Zbl 1524.68010

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 681-710 (2023).
PDFBibTeX XMLCite
Full Text: DOI

WOTSwana: a generalized \(\mathcal{S}_{\mathrm{ leeve }}\) construction for multiple proofs of ownership. (English) Zbl 07730591

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 491-511 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage sampling in the higher-bit approximate setting with a non-spherical Gaussian sampler. (English) Zbl 07730590

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 472-490 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations. (English) Zbl 07730589

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 450-471 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields. (English) Zbl 07730588

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 435-449 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based interactive aggregate signatures from lattices. (English) Zbl 07730587

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 408-432 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based signatures for range of inner product and its applications. (English) Zbl 07730586

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 382-407 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Group testing aggregate signatures with soundness. (English) Zbl 07730585

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 363-381 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding. (English) Zbl 07730584

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 337-362 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Pointcheval-Sanders signature-based synchronized aggregate signature. (English) Zbl 07730583

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 317-336 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4. (English) Zbl 07730582

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 292-314 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

An ultrafast cryptographically secure pseudorandom number generator. (English) Zbl 07730581

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 267-291 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A performance evaluation of IPsec with post-quantum cryptography. (English) Zbl 07730580

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 249-266 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault attack on AES using maximum four bytes faulty ciphertexts. (English) Zbl 07730579

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 235-245 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems. (English) Zbl 07730578

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 219-234 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Reputation at stake! A trust layer over decentralized ledger for multiparty computation and reputation-fair lottery. (English) Zbl 07730577

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 195-215 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Private evaluation of a decision tree based on secret sharing. (English) Zbl 07730576

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 171-194 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption with hierarchical authorized keyword search. (English) Zbl 07730575

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 147-170 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential testing of cryptographic libraries with hybrid fuzzing. (English) Zbl 07730574

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 124-144 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring encrypted keyboards to defeat client-side scanning in end-to-end encryption systems. (English) Zbl 07730573

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 100-123 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Towards constructing consistent pattern strength meters with User’s visual perception. (English) Zbl 07730572

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 81-99 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential cryptanalysis on reduced-round PRINCEcore. (English) Zbl 07730571

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 61-77 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key differential cryptanalysis of GMiMC used in post-quantum signatures. (English) Zbl 07730570

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 41-60 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Implicit key-stretching security of encryption schemes. (English) Zbl 07730569

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 17-40 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

See-in-the-middle attacks on blockciphers ARIA and DEFAULT. (English) Zbl 07730568

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 3-16 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

IND-CCA security of Kyber in the quantum random oracle model, revisited. (English) Zbl 07730519

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 148-166 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Optimizing the depth of quantum implementations of linear layers. (English) Zbl 07730518

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 129-147 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Multi-user security of the sum of truncated random permutations. (English) Zbl 1519.94090

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 682-710 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Optimizing intrusion detection systems placement against network virus spreading using a partially observable stochastic minimum-threat path game. (English) Zbl 1529.68069

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 274-296 (2023).
PDFBibTeX XMLCite
Full Text: DOI

A network centrality game for epidemic control. (English) Zbl 07727639

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 255-273 (2023).
PDFBibTeX XMLCite
Full Text: DOI

On poisoned Wardrop equilibrium in congestion games. (English) Zbl 1529.68067

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 191-211 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Robust moving target defense against unknown attacks: a meta-reinforcement learning approach. (English) Zbl 1529.68065

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 107-126 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Using deception in Markov game to understand adversarial behaviors through a capture-the-flag environment. (English) Zbl 1529.68062

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 87-106 (2023).
MSC:  68M25 91A15 91A80
PDFBibTeX XMLCite
Full Text: DOI arXiv

Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality. (English) Zbl 1529.68064

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 23-43 (2023).
MSC:  68M25 91A65 91A80
PDFBibTeX XMLCite
Full Text: DOI

The risk of attacker behavioral learning: can attacker fool defender under uncertainty? (English) Zbl 1529.68066

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 3-22 (2023).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

On security notions for encryption in a quantum world. (English) Zbl 07726582

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 592-613 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Quantum attacks on PRFs based on public random permutations. (English) Zbl 07726581

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 566-591 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Revisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversaries. (English) Zbl 07726566

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 223-248 (2023).
MSC:  68P25 68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Poly onions: achieving anonymity in the presence of churn. (English) Zbl 1519.94032

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 715-746 (2023).
PDFBibTeX XMLCite
Full Text: DOI

SCALES. MPC with small clients and larger ephemeral servers. (English) Zbl 1528.68047

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 502-531 (2023).
MSC:  68M25 68M14 94A60
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract). (English) Zbl 1519.94034

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 103-120 (2023).
MSC:  94A60 68M14 68M25
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 28th Australasian conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023. Proceedings. (English) Zbl 1528.68035

Lecture Notes in Computer Science 13915. Cham: Springer (ISBN 978-3-031-35485-4/pbk; 978-3-031-35486-1/ebook). xiii, 652 p. (2023).
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software