Search
Search Results
-
Smart Appliance Abnormal Electrical Power Consumption Detection
Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home... -
Projective Space Stern Decoding and Application to SDitH
We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size... -
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of... -
Device Fingerprinting in a Smart Grid CPS
Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms... -
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms... -
Game Theoretic Modeling of Insider Threats in an Organization
Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies.... -
One Time Chat – A Toy End-to-End Encrypted Web Messaging Service
In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web... -
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image... -
Physically Unclonable Fingerprints for Authentication
We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method... -
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic... -
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms
Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be... -
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
In the race for quantum-safe cryptography, fostered by the ongoing National Institute of Standards and Technology (NIST) post-quantum standardization... -
Diversity Algorithms for Laser Fault Injection
Before third-party evaluation and certification, manufacturers often conduct internal security evaluations on secure hardware devices, including... -
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection
Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe... -
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning
Microgrids face challenges in monitoring and controlling the power quality (PQ) of integrated electrical systems to make timely decisions.... -
EasyLog: An Efficient Kernel Logging Service for Machine Learning
Recently, logs serves as a crucial tool to monitor system’s real-time state for experiments and generate data for machine learning. However, the... -
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures
Critical National Infrastructure (CNI) is vital and critical to the delivery of essential services to society and is necessary for a country to... -
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness
The Fujisaki-Okamoto (FO) transformation is used in most proposals for post-quantum secure key encapsulation mechanisms (KEMs) like, e.g.,... -
Reducing Signature Size of Matrix-Code-Based Signature Schemes
This paper shows novel techniques to reduce the signature size of the code-based signature schemes MEDS and ALTEQ, by a large factor. For both... -
Compact Encryption Based on Module-NTRU Problems
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS...