default search action
22nd ACNS 2024: Abu Dhabi, United Arab Emirates - Workshops Part I
- Martin Andreoni:
Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14586, Springer 2024, ISBN 978-3-031-61485-9
AIBlock - Application Intelligence and Blockchain Security
- Saad El Jaouhari, Nouredine Tamani:
An End-to-End Secure Solution for IoMT Data Exchange. 3-15 - Xundi Yang, Kefan Qiu, Quanxin Zhang:
EasyLog: An Efficient Kernel Logging Service for Machine Learning. 16-28 - Yifan Zhou, Zhenyan Liu, Jingfeng Xue, Yong Wang, Ji Zhang:
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification. 29-42 - Mitja Goroshevsky, Nikita Sattarov, Alina Trepacheva:
Acki Nacki: A Probabilistic Proof-of-Stake Consensus Protocol with Fast Finality and Parallelisation. 43-62
AIHWS - Artificial Intelligence in Hardware Security
- Tatsuya Oyama, Mika Sakai, Yohei Hori, Toshihiro Katashita, Takeshi Fujino:
FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks. 65-83 - Yuta Fukuda, Kota Yoshida, Takeshi Fujino:
Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks. 84-101 - Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. 102-120 - Marina Krcek, Thomas Ordas:
Diversity Algorithms for Laser Fault Injection. 121-138 - Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin:
One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis. 139-157 - Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN Architecture Extraction on Edge GPU. 158-175 - Georgios Kokolakis, Athanasios Moschos, Angelos D. Keromytis:
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design. 176-194 - Gabriele Serafini, Léo Weissbart, Lejla Batina:
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework. 195-212
AIoTS - Artificial Intelligence and Industrial IoT Security
- Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, Darren Ng Wei Hong, Jianying Zhou:
Device Fingerprinting in a Smart Grid CPS. 215-234 - Mazhar Ali, Ajit Kumar, Bong Jun Choi:
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning. 235-245 - Alex Baron, Laurens Le Jeune, Wouter Hellemans, Md Masoom Rabbani, Nele Mentens:
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT. 246-264 - Adeola Adewumi, Mohammad Hammoudeh, Tooska Dargahi, Olamide Jogunola:
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. 265-280
SCI - Secure Cryptographic Implementation
- Xiaodong Ye, Teik Guan Tan, Jianying Zhou:
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries. 283-302 - Peter Cíbik, Patrik Dobias, Sara Ricci, Jan Hajny, Lukas Malina, Petr Jedlicka, David Smekal:
Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests. 303-318 - Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits. 319-339 - Xue Yang, Congming Wei, Yaoling Ding, Shaofei Sun, An Wang, Jiazhe Chen:
A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework. 340-358 - Yaoyuan Hu, An Wang, Weiping Gong, Jingjie Wu, Ziyu Wang, Shiming Zhang, Shufan Ma:
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems. 359-375 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4. 376-395
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.