The Ideal Functionalities for Private Set Union, Revisited. | 0 | 0.34 | 2022 |
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services | 0 | 0.34 | 2022 |
Shuffle-based Private Set Union: Faster and More Secure. | 0 | 0.34 | 2022 |
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications | 0 | 0.34 | 2022 |
<inline-formula><tex-math notation="LaTeX">${\sf PBT}$</tex-math><alternatives><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi mathvariant="sans-serif">PBT</mml:mi></mml:math><inline-graphic xlink:href="jia-ieq1-2998682.gif" xmlns:xlink="http://www.w3.org/1999/xlink"/></alternatives></inline-formula>: A New Privacy-Preserving Payment Protocol for Blockchain Transactions | 0 | 0.34 | 2022 |
Ciphertext-Only Fault Analysis Of Gift Lightweight Cryptosystem | 0 | 0.34 | 2022 |
Improved Pump and Jump BKZ by Sharp Simulator. | 0 | 0.34 | 2022 |
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications. | 0 | 0.34 | 2022 |
AL-PA: cross-device profiled side-channel attack using adversarial learning | 0 | 0.34 | 2022 |
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK | 0 | 0.34 | 2022 |
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems | 0 | 0.34 | 2022 |
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison | 0 | 0.34 | 2021 |
Improved Guess And Determine Attack On The Masha Stream Cipher | 0 | 0.34 | 2021 |
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks | 0 | 0.34 | 2021 |
Revisiting The Security Of Dbhts Macs: Beyond-Birthday-Bound In The Multi-User Setting | 0 | 0.34 | 2021 |
Binary Classification-Based Side-Channel Analysis | 0 | 0.34 | 2021 |
Attention - Based Non-Profiled Side-Channel Attack | 0 | 0.34 | 2021 |
Statistical Fault Analysis Of The Simeck Lightweight Cipher In The Ubiquitous Sensor Networks | 0 | 0.34 | 2021 |
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. | 0 | 0.34 | 2021 |
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting - Impossibility Result and Optimal Tightness. | 0 | 0.34 | 2021 |
Understanding the security of app-in-the-middle IoT | 0 | 0.34 | 2020 |
Ciphertext-only fault analysis on the Midori lightweight cryptosystem | 0 | 0.34 | 2020 |
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. | 0 | 0.34 | 2020 |
Improved Meet-In-The-Middle Attacks On Reduced-Round Deoxys-Bc-256 | 0 | 0.34 | 2020 |
Reusable Fuzzy Extractor Based On The Lpn Assumption | 0 | 0.34 | 2020 |
Dual System in Lattice: Fully Secure ABE from LWE Assumption. | 0 | 0.34 | 2020 |
Public-Key Puncturable Encryption: Modular and Compact Constructions. | 2 | 0.36 | 2020 |
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC | 0 | 0.34 | 2019 |
Generic Constructions of Robustly Reusable Fuzzy Extractor. | 0 | 0.34 | 2019 |
Structure-preserving public-key encryption with leakage-resilient CCA security. | 0 | 0.34 | 2019 |
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks | 0 | 0.34 | 2019 |
Ciphertext Policy Attribute-Based Encryption For Circuits From Lwe Assumption | 0 | 0.34 | 2019 |
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps | 2 | 0.36 | 2019 |
Nlp-Eye: Detecting Memory Corruptions Via Semantic-Aware Memory Operation Function Identification | 0 | 0.34 | 2019 |
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. | 0 | 0.34 | 2019 |
A Practical Dynamic Enhanced BFT Protocol. | 0 | 0.34 | 2019 |
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. | 0 | 0.34 | 2019 |
Pseudo random oracle of Merkle-Damgård hash functions revisited | 0 | 0.34 | 2019 |
Towards A Multi-Chain Future Of Proof-Of-Space | 0 | 0.34 | 2019 |
Improved impossible differential cryptanalysis of large-block Rijndael | 0 | 0.34 | 2019 |
Similar operation template attack on RSA-CRT as a case study. | 1 | 0.40 | 2018 |
Z-Channel: Scalable and Efficient Scheme in Zerocash. | 1 | 0.35 | 2018 |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. | 0 | 0.34 | 2018 |
Tightly Secure Encryption Schemes against Related-Key Attacks. | 0 | 0.34 | 2018 |
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. | 2 | 0.38 | 2018 |
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. | 0 | 0.34 | 2018 |
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. | 3 | 0.40 | 2018 |
Improved meet-in-the-middle attacks on reduced-round Piccolo. | 0 | 0.34 | 2018 |
An Empirical Study of SDK Credential Misuse in iOS Apps | 2 | 0.37 | 2018 |
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. | 3 | 0.49 | 2017 |