default search action
7th CSCML 2023: Be'er Sheva, Israel
- Shlomi Dolev, Ehud Gudes, Pascal Paillier:
Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings. Lecture Notes in Computer Science 13914, Springer 2023, ISBN 978-3-031-34670-5 - Yehuda Afek, Anat Bremler-Barr, Dor Israeli, Alon Noy:
Localhost Detour from Public to Private Networks. 1-17 - Madhurima Mukhopadhyay, Palash Sarkar:
Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation. 18-31 - Berry Schoenmakers, Toon Segers:
Efficient Extended GCD and Class Groups from Secure Integer Arithmetic. 32-48 - Ilan Komargodski, Yoav Tamir:
On Distributed Randomness Generation in Blockchains. 49-64 - Nir Drucker, Itamar Zimerman:
Efficient Skip Connections Realization for Secure Inference on Encrypted Data. 65-73 - Asaf Cohen, Pawel Cyprys, Shlomi Dolev:
Single Instance Self-masking via Permutations - (Preliminary Version). 74-84 - Divya Mishra, Itai Dror, Ofer Hadar, Daniel Choukroun, Shimrit Maman, Dan G. Blumberg:
A Fusion-Based Framework for Unsupervised Single Image Super-Resolution. 85-95 - Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul:
Generating One-Hot Maps Under Encryption. 96-116 - Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Building Blocks for LSTM Homomorphic Evaluation with TFHE. 117-134 - Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati, Stefano Zanero:
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks. 135-150 - Deborah Novick, Mark Last:
Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel. 151-169 - Klaas Meinke, Tamis Achilles van der Laan, Tiberiu Iancu, Ceyhun Cakir:
A Bag of Tokens Neural Network to Predict Webpage Age. 170-180 - Subhabrata Samajder, Palash Sarkar:
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations. 181-187 - Riyanka Jena, Priyanka Singh, Manoranjan Mohanty:
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image. 188-199 - George Vershinin, Asaf Cohen, Omer Gurewitz:
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO. 200-215 - Ron Segev, Avi Mendelson:
The Use of Performance-Countersto Perform Side-Channel Attacks. 216-233 - Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati, Stefano Zanero:
HAMLET: A Transformer Based Approach for Money Laundering Detection. 234-250 - Jiayi Tan, Dipti Kapoor Sarmah:
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks. 251-272 - Ziyu Zhao, Jintai Ding:
Practical Improvements on BKZ Algorithm. 273-284 - Faithful Chiagoziem Onwuegbuche, Anca Delia Jurcut, Liliana Pasquale:
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction. 285-295 - Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. 296-306 - Stan Korzilius, Berry Schoenmakers:
New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic. 307-319 - Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs. 320-336 - Stefano Longari, Francesco Noseda, Michele Carminati, Stefano Zanero:
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks. 337-352 - Giorgos Zirdelis:
On Adaptively Secure Prefix Encryption Under LWE. 353-371 - Devharsh Trivedi, Aymen Boudguiga, Nikos Triandopoulos:
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption. 372-388 - Shlomi Dolev, Avraam Yagudaev, Moti Yung:
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version). 389-397 - Hatice Kübra Güner, Ceyda Mangir, Oguz Yayla:
Improving Performance in Space-Hard Algorithms. 398-410 - Silvie Levy, Ehud Gudes, Danny Hendler:
A Survey of Security Challenges in Automatic Identification System (AIS) Protocol. 411-423 - Shay Gueron:
A New Interpretation for the GHASH Authenticator of AES-GCM. 424-438 - Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang:
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off. 439-457 - Rajnish Kumar, Shlomi Arnon:
Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks. 458-470 - Donghoon Chang, Moti Yung:
Midgame Attacks and Defense Against Them. 471-492 - Andrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames:
Deep Neural Networks for Encrypted Inference with TFHE. 493-500 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents. 501-510 - Lucas Miranda, Cainã Figueiredo, Daniel Sadoc Menasché, Anton Kocheturov:
Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages. 511-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.