ICICS C

34 papers

YearTitle / Authors
2020A Blockchain Traceable Scheme with Oversight Function.
Tianjun Ma, Haixia Xu, Peili Li
2020A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2020A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3.
Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang
2020A Family of Subfield Hyperelliptic Curves for Use in Cryptography.
Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta
2020A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers.
Sebastian Renner, Enrico Pozzobon, Jürgen Mottok
2020A Love Affair Between Bias Amplifiers and Broken Noise Sources.
George Teseleanu
2020A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu
2020A New General Method of Searching for Cubes in Cube Attacks.
Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan
2020A Symbolic Model for Systematically Analyzing TEE-Based Protocols.
Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang
2020A Variational Generative Network Based Network Threat Situation Assessment.
Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang
2020Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks.
Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli
2020Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree.
Kaiming Chen, Jiageng Chen
2020Attacks on Integer-RLWE.
Alessandro Budroni, Benjamin Chetioui, Ermes Franch
2020Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App.
Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley
2020Blind Functional Encryption.
Sébastien Canard, Adel Hamdi, Fabien Laguillaumie
2020Client-Oblivious OPRAM.
Gareth T. Davies, Christian Janson, Daniel P. Martin
2020CoinBot: A Covert Botnet in the Cryptocurrency Network.
Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang
2020Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks.
Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss
2020Experimental Comparisons of Verifiable Delay Functions.
Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang
2020HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator.
Luis S. Kida, Soham Jayesh Desai, Alpa Trivedi, Reshma Lal, Vincent Scarlata, Santosh Ghosh
2020Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings
Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou
2020Information-Theoretic Security of Cryptographic Channels.
Marc Fischlin, Felix Günther, Philipp Muth
2020Lattice HIBE with Faster Trapdoor Delegation and Applications.
Guofeng Tang, Tian Qiu
2020Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model.
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation.
Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly
2020New Practical Public-Key Deniable Encryption.
Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen
2020One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti
2020PiDicators: An Efficient Artifact to Detect Various VMs.
Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia
2020Profile Matching Across Online Social Networks.
Anisa Halimi, Erman Ayday
2020Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen
2020The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures.
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
2020Towards Real-Time Hidden Speaker Recognition by Means of Fully Homomorphic Encryption.
Martin Zuber, Sergiu Carpov, Renaud Sirdey
2020Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity.
Hector B. Hougaard, Atsuko Miyaji
2020rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices.
Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni