×

Found 542 Documents (Results 1–100)

PAC privacy: automatic privacy measurement and control of data processing. (English) Zbl 07799235

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 611-644 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

A study for security of visual cryptography. (English) Zbl 1522.94041

El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 261-277 (2023).
MSC:  94A60 94A08 94A15
PDFBibTeX XMLCite
Full Text: DOI

A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations. (English) Zbl 07730589

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 450-471 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Differential fault attack on AES using maximum four bytes faulty ciphertexts. (English) Zbl 07730579

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 235-245 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

See-in-the-middle attacks on blockciphers ARIA and DEFAULT. (English) Zbl 07730568

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 3-16 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On poisoned Wardrop equilibrium in congestion games. (English) Zbl 1529.68067

Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 191-211 (2023).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Learning-based side-channel analysis on PIPO. (English) Zbl 07628056

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 308-321 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault attack on lightweight block cipher PIPO. (English) Zbl 07628055

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 296-307 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Compiler-based attack origin tracking with dynamic taint analysis. (English) Zbl 07628049

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 175-191 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Reinforcement learning-based design of side-channel countermeasures. (English) Zbl 1499.68059

Batina, Lejla (ed.) et al., Security, privacy, and applied cryptography engineering. 11th international conference, SPACE 2021, Kolkata, India, December 10–13, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13162, 168-187 (2022).
MSC:  68M25 68T07 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Notes on backward stochastic differential equations for computing XVA. (English) Zbl 07827227

Cheng, Jin (ed.) et al., Proceedings of the forum Math-for-Industry 2018. Big data analysis, AI, Fintech, math in finances and economics, Shanghai, China, November 17–21, 2018. Singapore: Springer. Math. Ind. (Tokyo) 35, 15-50 (2021).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Upper bound computation of information leakages for unbounded recursion. (English) Zbl 1522.68145

Calinescu, Radu (ed.) et al., Software engineering and formal methods. 19th international conference, SEFM 2021, virtual event, December 6–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13085, 160-177 (2021).
MSC:  68N30
PDFBibTeX XMLCite
Full Text: DOI

Attestation waves: platform trust via remote power analysis. (English) Zbl 1498.68052

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 460-482 (2021).
MSC:  68M25 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis. (English) Zbl 1491.68038

Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 53-81 (2021).
MSC:  68M25 68T07 94A60
PDFBibTeX XMLCite
Full Text: DOI

First full-fledged side channel attack on HMAC-SHA-2. (English) Zbl 1492.68039

Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 31-52 (2021).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cyber autonomy in software security: techniques and tactics. (English) Zbl 07526406

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 204-229 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Security comparisons and performance analyses of post-quantum signature algorithms. (English) Zbl 1492.81045

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 424-447 (2021).
PDFBibTeX XMLCite
Full Text: DOI

An attack on some signature schemes constructed from five-pass identification schemes. (English) Zbl 1520.94078

Krenn, Stephan (ed.) et al., Cryptology and network security. 19th international conference, CANS 2020, Vienna, Austria, December 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12579, 3-22 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of masked ciphers: a not so random idea. (English) Zbl 1511.94056

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 817-850 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

SILVER – statistical independence and leakage verification. (English) Zbl 1511.94122

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 787-816 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A device-independent protocol for XOR oblivious transfer. (English) Zbl 1507.81073

Flammia, Steven T. (ed.), 15th conference on the theory of quantum computation, communication and cryptography, TQC 2020, Riga, Latvia, June 9–12, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 158, Article 12, 15 p. (2020).
PDFBibTeX XMLCite
Full Text: DOI arXiv

A symbolic model for systematically analyzing TEE-based protocols. (English) Zbl 1511.68049

Meng, Weizhi (ed.) et al., Information and communications security. 22nd international conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12282, 126-144 (2020).
MSC:  68M25 68Q60 94A60
PDFBibTeX XMLCite
Full Text: DOI

Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange. (English) Zbl 1500.94023

Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 483-502 (2020).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI Link

Acceleration of spatial correlation based hardware trojan detection using shared grids ratio. (English) Zbl 07441069

Slamanig, Daniel (ed.) et al., Mathematical aspects of computer and information sciences. 8th international conference, MACIS 2019, Gebze, Turkey, November 13–15, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11989, 187-201 (2020).
MSC:  68-XX 65-XX
PDFBibTeX XMLCite
Full Text: DOI

MASAGE: model-agnostic sequential and adaptive game estimation. (English) Zbl 1483.68047

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 365-384 (2020).
MSC:  68M25 91A80
PDFBibTeX XMLCite
Full Text: DOI

Security of hedged Fiat-Shamir signatures under fault attacks. (English) Zbl 1479.94290

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 644-674 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards automated augmentation and instrumentation of legacy cryptographic executables. (English) Zbl 07314399

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12147, 364-384 (2020).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

An automated security analysis framework and implementation for MTD techniques on cloud. (English) Zbl 1446.68024

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 150-164 (2020).
MSC:  68M25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software