Linked e-resources
Details
Table of Contents
Analysis of Applied Systems
Breaking and Fixing Third-Party Payment Service for Mobile Apps
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
Secure Computations
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
LLVM-based Circuit Compilation for Practical Secure Computation
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Cryptanalysis
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
Efficient Methods to Search for Best Differential Characteristics on SKINNY
Towards Efficient LPN-Based Symmetric Encryption
System Security
A Differentially Private Hybrid Approach to Traffic Monitoring
Proactive Detection of Phishing Kit Traffic
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
SoK: Auditability and Accountability in Distributed Payment Systems
Defending Web Servers Against Flash Crowd Attacks
Cryptography and its Applications
TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
Cryptanalysis of the Binary Permuted Kernel Problem
Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Improved Structured Encryption for SQL Databases via Hybrid Indexing.
Breaking and Fixing Third-Party Payment Service for Mobile Apps
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library
Secure Computations
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
LLVM-based Circuit Compilation for Practical Secure Computation
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Cryptanalysis
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
Efficient Methods to Search for Best Differential Characteristics on SKINNY
Towards Efficient LPN-Based Symmetric Encryption
System Security
A Differentially Private Hybrid Approach to Traffic Monitoring
Proactive Detection of Phishing Kit Traffic
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
SoK: Auditability and Accountability in Distributed Payment Systems
Defending Web Servers Against Flash Crowd Attacks
Cryptography and its Applications
TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures
Cryptanalysis of the Binary Permuted Kernel Problem
Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Improved Structured Encryption for SQL Databases via Hybrid Indexing.