Information Security

Information Security

27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I

Mouha, Nicky; Nikiforakis, Nick

Springer International Publishing AG

11/2024

322

Mole

9783031757563

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Blockchain.



.- The Formal Verification of Aptos Coin.



.- Anonymous, Timed and Revocable Proxy Signatures.



.- Symmetric-Key Cryptography.



.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.



.- Security Analysis of CMAC in the Multi-User Model.



.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.



.- Machine Learning.



.- Optimizing label-only membership inference attacks by global relative decision boundary distances.



.- Risk of Text Backdoor Attacks under Dataset Distillation.



.- Mobile Security and Trusted Execution.



.- Emulating Android Device Drivers via Borrowed Execution Context.



.- Software Security.



.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.



.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.



.- Multi-Party Computation.



.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.



.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.



.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.



.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.



.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.



.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.



.- Post-Quantum Cryptography.



.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.



.- Deep LLL on Module lattices.



.- Multi-way High-throughput Implementation of Kyber.



.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.



.- A faster variant of CGL hash function via efficient backtracking checks.



.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.



.- System Security.



.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.



.- Property Guided Secure Configuration Space Search.



.- Adversarial analysis of software composition analysis tools.



.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cryptographic primitives;Cryptographic protocols;Block and stream ciphers;Hash functions and message authentication codes;Cryptanalysis and other attacks;Digital signatures;Public key encryption;Security protocols;Systems security;Web security;Mobile and wireless security;Intrusion detection systems;Phishing;Malware;Software security