We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Smart Appliance Abnormal Electrical Power Consumption Detection

    Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home...
    Conference paper 2024
  2. Projective Space Stern Decoding and Application to SDitH

    We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size...
    Kevin Carrier, Valerian Hatey, Jean-Pierre Tillich in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  3. Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT

    Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of...
    Alex Baron, Laurens Le Jeune, ... Nele Mentens in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  4. Device Fingerprinting in a Smart Grid CPS

    Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms...
    Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, ... Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  5. Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries

    The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms...
    **aodong Ye, Teik Guan Tan, Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  6. Game Theoretic Modeling of Insider Threats in an Organization

    Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies....
    K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  7. One Time Chat – A Toy End-to-End Encrypted Web Messaging Service

    In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web...
    Kamil Kaczyński, Michał Glet in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  8. Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

    Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image...
    Gabriele Serafini, Léo Weissbart, Lejla Batina in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  9. Physically Unclonable Fingerprints for Authentication

    We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method...
    Navajit S. Baban, Jiarui Zhou, ... Ramesh Karri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  10. Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems

    Simple Power Analysis (SPA) is a technique that directly analyzes the power consumption information collected during the execution of cryptographic...
    Yaoyuan Hu, An Wang, ... Shufan Ma in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  11. Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms

    Homomorphic encryption (HE) is a promising approach to preserving the privacy of data used in machine learning by allowing computations to be...
    Amirhossein Ebrahimi Moghaddam, Buvana Ganesh, Paolo Palmieri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  12. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding

    In the race for quantum-safe cryptography, fostered by the ongoing National Institute of Standards and Technology (NIST) post-quantum standardization...
    Simone Perriello, Alessandro Barenghi, Gerardo Pelosi in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  13. Diversity Algorithms for Laser Fault Injection

    Before third-party evaluation and certification, manufacturers often conduct internal security evaluations on secure hardware devices, including...
    Conference paper 2024
  14. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

    Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe...
    Alessandro Brighente, Mauro Conti, ... Federico Turrin in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  15. Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning

    Microgrids face challenges in monitoring and controlling the power quality (PQ) of integrated electrical systems to make timely decisions....
    Mazhar Ali, Ajit Kumar, Bong Jun Choi in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  16. EasyLog: An Efficient Kernel Logging Service for Machine Learning

    Recently, logs serves as a crucial tool to monitor system’s real-time state for experiments and generate data for machine learning. However, the...
    Xundi Yang, Kefan Qiu, Quanxin Zhang in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  17. Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures

    Critical National Infrastructure (CNI) is vital and critical to the delivery of essential services to society and is necessary for a country to...
    Adeola Adewumi, Mohammad Hammoudeh, ... Olamide Jogunola in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  18. A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness

    The Fujisaki-Okamoto (FO) transformation is used in most proposals for post-quantum secure key encapsulation mechanisms (KEMs) like, e.g.,...
    Kathrin Hövelmanns, Christian Majenz in Post-Quantum Cryptography
    Conference paper 2024
  19. Reducing Signature Size of Matrix-Code-Based Signature Schemes

    This paper shows novel techniques to reduce the signature size of the code-based signature schemes MEDS and ALTEQ, by a large factor. For both...
    Tung Chou, Ruben Niederhagen, ... Simona Samardjiska in Post-Quantum Cryptography
    Conference paper 2024
  20. Compact Encryption Based on Module-NTRU Problems

    The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS...
    Shi Bai, Hansraj Jangir, ... **wei Zheng in Post-Quantum Cryptography
    Conference paper 2024
Did you find what you were looking for? Share feedback.