A Note on the Security Framework of Two-key DbHtS MACs (Englisch)
- Neue Suche nach: Guo, Tingting
- Neue Suche nach: Wang, Peng
- Neue Suche nach: Guo, Tingting
- Neue Suche nach: Wang, Peng
In:
Information and communications security
; 55-68
;
2022
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:A Note on the Security Framework of Two-key DbHtS MACs
-
Beteiligte:Guo, Tingting ( Autor:in ) / Wang, Peng ( Autor:in )
-
Kongress:ICICS ; 24. ; 2022 ; Canterbury
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham, Switzerland
-
Erscheinungsdatum:2022
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
BS: Blockwise Sieve Algorithm for Finding Short Vectors from SublatticesCao, Jinzheng / Cheng, Qingfeng / Li, Xinghua / Pan, Yanbin et al. | 2022
- 19
-
Calibrating Learning Parity with Noise Authentication for Low-Resource DevicesTan, Teik Guan / Soh, De Wen / Zhou, Jianying et al. | 2022
- 37
-
New Results of Breaking the CLS Scheme from ACM-CCS 2014Gao, Jing / Xu, Jun / Wang, Tianyu / Hu, Lei et al. | 2022
- 55
-
A Note on the Security Framework of Two-key DbHtS MACsGuo, Tingting / Wang, Peng et al. | 2022
- 69
-
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster ComputationOiu, Zhi / Yang, Kang / Yu, Yu / Zhou, Lijing et al. | 2022
- 89
-
Conditional Cube Attacks on Full Members of KNOT-AEAD FamilyChen, Siwei / Xiang, Zejun / Zeng, Xiangyong / Zhang, Shasha et al. | 2022
- 109
-
Fast Fourier Orthogonalization over NTRU LatticesSun, Shuo / Zhou, Yongbin / Zhang, Rui / Tao, Yang / Qiao, Zehua / Ming, Jingdian et al. | 2022
- 128
-
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic StudyChen, Kaini / Shen, Peisong / Lv, Kewei / Chen, Chi et al. | 2022
- 148
-
Tight Analysis of Decryption Failure Probability of Kyber in RealityFang, Boyue / Wang, Weize / Zhao, Yunlei et al. | 2022
- 163
-
Improving Deep Learning Based Password Guessing Models Using Pre-processingWu, Yuxuan / Wang, Ding / Zou, Yunkai / Huan, Ziyi et al. | 2022
- 184
-
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On SystemTolbert, Matthew M. / Hess, Elie M. / Nascimento, Mattheus C. / Lei, Yunsen / Shue, Craig A. et al. | 2022
- 201
-
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised TerminalSciancalepore, Savio / Raponi, Simone / Caldarola, Daniele / Pietro, Roberto Di et al. | 2022
- 221
-
Lightweight and Practical Privacy-Preserving Image Masking in Smart CommunityLiu, Zhen / Liu, Yining / Meng, Weizhi et al. | 2022
- 240
-
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity NetworksHan, Yang / Xu, Dawei / Gao, Jiagti / Zhu, Liehuang et al. | 2022
- 261
-
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on CloudLi, Meng / Zhang, Mingwei / Gao, Jianbo / Lal, Chhagan / Conti, Mauro / Alazab, Mamoun et al. | 2022
- 281
-
Privacy-Aware Split Learning Based Energy Theft Detection for Smart GridsAlromih, Arwa / Clark, . John A. / Gope, Prosanta et al. | 2022
- 303
-
Query-Efficient Black-Box Adversarial Attack with Random Pattern NoisesSuzuki, Makoto Yuito. Kenta / Yoneyama, Kazuki et al. | 2022
- 324
-
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional DatasetsLei, Qi / Yang, Zijia / Wang, Oin / Ding, Yaoling / Ma, Zhe / Wang, An et al. | 2022
- 342
-
TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZoneSong, Liantao / Ding, Yan / Dong, Pan / Guo, Yong / Wang, Chuang et al. | 2022
- 359
-
FuzzBoost: Reinforcement Compiler FuzzingLi, Xiaoting / Liu, Xiao / Chen, Lingwei / Prajapati, Rupesh / Wu, Dinghao et al. | 2022
- 376
-
Secure Boolean Masking of Gimli: Optimization and Evaluation on the Cortex-M4Chang, Tzu-Hsien / Kuo, Yen-Ting / Chen, Jiun-Peng / Yang, Bo-Yin et al. | 2022
- 394
-
DeepC2: AI-Powered Covert Command and Control on OSNSWang, Zhi / Liu, Chaoge / Cui, Xiang / Yin, Jie / Liu, Jiaxi / Wu, Di / Liu, Oixu et al. | 2022
- 417
-
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly DetectionPeng, Hongyi / Sachidananda, Vinay / Lim, Teng Joon / Patıl, Rajendra / Liu, Mingchang / Muneeswaran, Sivaanandh / Gurusamy, Mohan et al. | 2022
- 438
-
Deep Learning Based Webshell Detection Coping with Long Text and Lexical AmbiguityAn, Tongjian / Shui, Xuefei / Gao, Hongkui et al. | 2022
- 458
-
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity DetectionXia, Fengliang / Wu, Guixing / Zhao, Guochao / Li, Xiangyu et al. | 2022
- 472
-
FN2: Fake News DetectioN Based on Textual and Contextual FeaturesRabhi, Mouna / Bakiras, Spiridon / Pietro, Roberto Di et al. | 2022
- 492
-
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call SequencesGao, Mohan / Wu, Peng / Pan, Li et al. | 2022
- 508
-
Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer NetworksDong, Bo / Wu, Yuhang / Yeh, Micheal / Lin, Yusan / Chen, Yuzhong / Yang, Hao / Wang, Fei / Bai, Wanxin / Brahmkstri, Krupa / Yimin, Zhang et al. | 2022
- 525
-
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid ApproachLiu, Mingchang / Sachidananda, Vinay / Peng, Hongyi / Patil, Rajendra / Muneeswaran, Sivaanandh / Gurusamy, Mohan et al. | 2022
- 546
-
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern MiningMamun, Mohammad / Buffett, Scott et al. | 2022
- 569
-
Dependency-Based Link Prediction for Learning Microsegmentation PolicyNoel, Steven / Swarup, Vipin et al. | 2022
- 589
-
Chuchotage: In-line Software Network Protocol Translation for (D)TLS PegahBideh, Nikbakht / Paladi, Nicolae et al. | 2022
- 608
-
Study on the Effect of Face Masks on Forensic Speaker RecognitionBogdanel, Georgiana / Belghazi-Mohamed, Nadia / Gómez-Moreno, Hilario / Lafuente-Arroyo, Sergio et al. | 2022
- 622
-
Video Forensics for Object Removal Based on Darknet3DZhang, Kejun / Wang, Yuhao / Yu, Xinying et al. | 2022