Filters








42 Hits in 7.3 sec

Page 3004 of Mathematical Reviews Vol. , Issue 2002D [page]

<span title="">2002</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
Addenda “Effect of symmetry to the structure of positive solutions in nonlinear elliptic problems” Advanced mean field methods Advances in cryptology —ASIAC RYPT 2000 Advances in mathematical fluid mechanics  ...  , 6th Annual International, ASIACRYPT 2000 .. . *94046 Congress: Formal Methods in the Development of Computing Systems, Ist World * 68009—* 68010 Paraconsistency, Ist World ... * 03004 Constanta, 2000  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002-04_2002d/page/3004" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002-04_2002d/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

From New Technologies to New Solutions [chapter]

Stéphanie Kerckhof, François-Xavier Standaert, Eric Peeters
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we illustrate the interest of FRAM-based microcontrollers for physically secure cryptographic hardware with two case studies.  ...  It also provides high security levels in cases where this assumption is relaxed (e.g. for context or performance reasons).  ...  This work has been funded in parts by the Walloon region WIST program project MIPSs, by the European Commission through the ERC project 280141 (acronym CRASH) and by the European ISEC action grant HOME  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-08302-5_2">doi:10.1007/978-3-319-08302-5_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gr2xp3s7kzcdfehoyohtvm3eve">fatcat:gr2xp3s7kzcdfehoyohtvm3eve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808191128/https://perso.uclouvain.be/fstandae/PUBLIS/136.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/eb/3ceb07b7b6da16771c0d845fe913a7e93ab63cf1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-08302-5_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

<span title="2015-07-06">2015</span> <i title="CRC Press"> Network Security and Communication Engineering </i> &nbsp;
No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording  ...  Although all care is taken to ensure integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property  ...  ., Shamir, A. 1986 The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [1] Brennan L E, Reed I S. Theory of Adaptive Radar.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/b18660-165">doi:10.1201/b18660-165</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jzfm3mzjp5eodi5gltayr4i544">fatcat:jzfm3mzjp5eodi5gltayr4i544</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201228120401/https://s3-euw1-ap-pe-ws4-capi2-distribution-p.s3-eu-west-1.amazonaws.com/books/9780429226120/HUBPMP/9780429226120_googleScholarPDF.pdf?response-content-disposition=attachment%3B%20filename%3D%229780429226120_googlepreview.pdf%22&amp;response-content-type=application%2Fpdf&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEIz%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJHMEUCIADL9LTBqQZz28hY2DhNr61dTSH10HQlJGqAB%2FQCsGruAiEA%2Fy%2B2GFXDkeKvMhlkk5cHgpkj5Dp5rpI9Y4%2B6UFpqh1cqtAMIRBACGgwwMTIxNzcyNjQ1MTEiDFP1TYJMtEpscykevyqRA7T8XkQIK0hx42g6VoayHsCar2LKX0Yl3XLTjMsd70RHWvvL0hhEa8wWbLhkoQyc%2FGNaOehtWZnxOzP2qFR%2Fmzfc5B%2BB98ZfnTcFCsWrAXN0B%2BJ5Do%2FZ6zOvhiA2scyiIcIy2IoPCigz4V5mJzV4p2Kgi%2Ffui0vLs0jM4zJYzYHClo1TsscknCLQH2mEFqGsBuE0vEZFQ7rMqlgky1i1sRP8y8gjrnGxaOiRcyMQFuYaeypbZzQpH0sIzp6sRzfVb2xRpt6sok3fqWkOSLSqruO9EEPrVQhW5GZv5r%2FphJOAIEgcs4Zlq2oO71C35Jt0iXt6wYy842cD3kfw290gmvFqjEo%2BHlRioze22zFrxhIa3A7rUgJUXtmKVNjefrFqJSIxpyJU0cd1X9Dj27si4e89ug%2FHsLG2aK1JmLh8%2FLZSDOaZpw7b6g%2Fr%2FkAuAAoP%2FiYYL0asVK7PJgWV5ecUzRXVrVt9q1Gm%2B5C78%2BMsJ9h%2FLB%2BXfDUyhpOLjftHB0B%2BIEgNWC8eAoXgMiUbhY8vYWUvMIr9pv8FOusBvgljdoRC%2F2gF5RYh5zI0QOIxQHFjIhYWcbYq5k8tu27sgHX9HfnuUzSE3Rzs%2BY5gV1%2FIwwA6XPXwsaQ2AXSQzufdwMhxgdqNPfDXK6qvWll33DiCKTdZz7IGVT0%2B%2F%2FjUu0n3HAQvQnf7YfROfscb6U7DVVG0gm2ezi2A61PZbglpvrOANUYwmYM%2BHaIfKetUCsvnRi8nuh5ysOf4eOmcs4eAilVJ5GGrmWo6CyX57GRDDD3Qb4fkDIBai1wbsJ3mqxP1bQ3pz0ZtY%2BU1dNL1S8705obDR8nLGqlxPiBVU0d%2FEwzCnKOhXPwDRA%3D%3D&amp;AWSAccessKeyId=ASIAQFVOSJ57R3QXC2UO&amp;Expires=1609761840&amp;Signature=kK0Qm%2BRmf%2BfgzWq8SggazSxsub0%3D" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/ac/beac7b22142e45d7db6d6f3e78fb828ae4287e62.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/b18660-165"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Probing Security through Input-Output Separation and Revisited Quasilinear Masking

Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
<span title="2021-07-09">2021</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
We further patch a flaw in the original security proof and extend it from the random probing model to the stronger region probing model.  ...  Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known as the noisy leakage model.  ...  Acknowledgments This work was partly supported by the French FUI-AAP25 VeriSiCC project and by the Innovate UK Research Grant 104423 (PQ Cybersecurity).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.599-640">doi:10.46586/tches.v2021.i3.599-640</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ylo425c6bjgcvopugo7vurhx2u">fatcat:ylo425c6bjgcvopugo7vurhx2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210711043017/https://tches.iacr.org/index.php/TCHES/article/download/8987/8564" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e9/06/e906cc838ce7324eb9a05a41edf3bcc3fbf6d8db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.599-640"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Bitslice Masking and Improved Shuffling:

Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos
<span title="2022-02-15">2022</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
impact was independent of the masking security order in previous works.  ...  When these conditions are not met, masking only is the best option. As additional side results, we improve the best known attack against the shuffling countermeasure from ASIACRYPT 2012.  ...  This work has been funded in parts by the European Union and the Walloon Region through the ERC project SWORD (project 724725) and the FEDER project USERMedia (convention number 501907-379156).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2022.i2.140-165">doi:10.46586/tches.v2022.i2.140-165</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/363tfxbm5zdvhf7aa5ksg6civ4">fatcat:363tfxbm5zdvhf7aa5ksg6civ4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220427054726/https://tches.iacr.org/index.php/TCHES/article/download/9484/9025" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/45/d745ca3b0bce73027d7ea0216b0df715c7d693a0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2022.i2.140-165"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
<span title="2018-09-12">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this survey, we study the use of DL techniques within the domain of information security. We systematically reviewed 77 papers and presented them from a data-centric perspective.  ...  Based on an analysis of our reviewed papers, we point out shortcomings of DL-methods to those requirements and discuss further research opportunities.  ...  Instead of Iris as a biometric, Zhao et al. focus on the region around the eyes – the periocular region – for authentication [180].  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1809.04332v1">arXiv:1809.04332v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xfb7lgrkw5cirdl3qvmg3ssnbi">fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928051249/https://arxiv.org/pdf/1809.04332v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/85/d485683ed45dadd53b18b9e4ac5eacb3a7520334.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1809.04332v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

DATA AND INFORMATION SECURITY: A MODERN CRYPTOGRAPHIC ALGORITHM

Obaidur Rahaman
<span title="2017-10-31">2017</span> <i title="International Journal Of Advanced Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mmn4oevdbfbf5leqgrynhcypzm" style="color: black;">International Journal of Advanced Research</a> </i> &nbsp;
Current research at the theoretical end of cryptology is found at the FOCS, STOC, Crypto, Eurocrypt, and Asiacrypt conferences.  ...  Such security is called unconditional (or statistical) security, as it doesn't depend either on the computing power available to the opponent or on there being no future advances in mathematics that provide  ...  We'll return to this repeatedly in later chapters. Research Problems There are many active threads in cryptography research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21474/ijar01/5666">doi:10.21474/ijar01/5666</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j5s6sxkscnc63ivqdhgg2qsf2i">fatcat:j5s6sxkscnc63ivqdhgg2qsf2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210505111221/https://www.cl.cam.ac.uk/~rja14/Papers/SE-05.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/f8/85f8c17a09df5f939cf7be0741a6b8caec76ef7f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21474/ijar01/5666"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
<span title="2015-04-22">2015</span> <i title="Association of Technology and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lhvdmzuqxreinc3m4ancngr4qi" style="color: black;">International Journal of Computer Applications Technology and Research</a> </i> &nbsp;
A Security use of decryption with decryption key stored in RFID tags embedded within ID cards.  ...  However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy  ...  Takashima, "Fully secure unbounded inner-product and attribute-based encryption," in Proc. ASIACRYPT, 2012, vol. 7. [27] V. Goyal, A. Jain, O. Pandey, and A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0405.1001">doi:10.7753/ijcatr0405.1001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7xpnnpep5vd7hcrmcjr4fvpnq4">fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829230643/http://www.ijcat.com/archives/volume4/volume4_issue5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/fd/3ffd4009d8dc150220ebddd2986101fa3ec33328.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0405.1001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Order-Preserving Encryption Secure Beyond One-Wayness [chapter]

Isamu Teranishi, Moti Yung, Tal Malkin
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Semantic-security of individual plaintext bits given the corresponding ciphertext is a fundamental notion in modern cryptography.  ...  In order to be clear, we note that the earlier security notions, while innovative and surprising, nevertheless tell us nothing about the above partial-plaintext indistinguishability because they are limited  ...  We thank the anonymous reviewers of ASIACRYPT 2014 for useful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-45608-8_3">doi:10.1007/978-3-662-45608-8_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sldt62lnirbzbhq62spe5yr554">fatcat:sldt62lnirbzbhq62spe5yr554</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501213130/https://link.springer.com/content/pdf/10.1007%2F978-3-662-45608-8_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/d2/12d2fb2c98b848b5fcc671d5caceb27e6081873c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-45608-8_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Making Masking Security Proofs Concrete [chapter]

Alexandre Duc, Sebastian Faust, François-Xavier Standaert
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In particular, we re-state their main proof for the masking countermeasure based on a mutual information metric, which is frequently used in concrete physical security evaluations.  ...  Thanks to these tools, we argue that masking with non-independent leakages may provide improved security levels in certain scenarios.  ...  François-Xavier Standaert is a research associate of the Belgian Fund for Scientific Research. This work has been funded in parts by the ERC project 280141 (CRASH).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46800-5_16">doi:10.1007/978-3-662-46800-5_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6osh7j6upveutezcycxko3cs7y">fatcat:6osh7j6upveutezcycxko3cs7y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160310090502/http://eprint.iacr.org/2015/119.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/28/d728cbcf029ef61620ad499b283aedcabe5362cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46800-5_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version

Alexandre Duc, Sebastian Faust, François-Xavier Standaert
<span title="2018-01-12">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
In particular, we re-state their main proof for the masking countermeasure based on a mutual information metric, which is frequently used in concrete physical security evaluations.  ...  Thanks to these tools, we argue that masking with non-independent leakages may provide improved security levels in certain scenarios.  ...  François-Xavier Standaert is a research associate of the Belgian Fund for Scientific Research. This work has been funded in parts by the ERC project 280141 (CRASH).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-018-9277-0">doi:10.1007/s00145-018-9277-0</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/plkoujkigbgebbbjtqdtfhihqe">fatcat:plkoujkigbgebbbjtqdtfhihqe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160310090502/http://eprint.iacr.org/2015/119.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/28/d728cbcf029ef61620ad499b283aedcabe5362cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-018-9277-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview [article]

Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu
<span title="2021-08-09">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential part in the entire Android ecosystem. However, TPL is a double-edged sword.  ...  We hope that these contributions can give readers a clear overview of existing TPL-related studies and inspire them to go beyond the current status quo by advancing the discipline with innovative approaches  ...  consider venues in the fundamental cryptography field (e.g., EUROCRYPT, CRYPTO, ASIACRYPT, FC, TCC).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.03787v1">arXiv:2108.03787v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jnj4kvlkuzg3hbgy4pl5wpvle4">fatcat:jnj4kvlkuzg3hbgy4pl5wpvle4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210820155912/https://arxiv.org/pdf/2108.03787v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/b3/33b372c36fc79c851976c59a555119f1879820cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.03787v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

FedPOIRec: Privacy Preserving Federated POI Recommendation with Social Influence [article]

Vasileios Perifanis, George Drosatos, Giorgos Stamatelatos, Pavlos S. Efraimidis
<span title="2021-12-21">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this work, we present FedPOIRec, a privacy preserving federated learning approach enhanced with features from users' social circles for top-N POI recommendations.  ...  on the user side.  ...  .), Advances in Cryptology – ASIACRYPT 2017, Vol. 10624, Springer International Publishing, Cham, 2017, pp. 409–437. doi: 10.1007/978-3-319-70694-8_15. [27] V. Lyubashevsky, C. Peikert, O.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11134v1">arXiv:2112.11134v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5v4scfks6bawlknkfru4nuxlcu">fatcat:5v4scfks6bawlknkfru4nuxlcu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220103235538/https://arxiv.org/pdf/2112.11134v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/eb/f0eb306c46f03c48edfc5a31ee2d94ae2e2da64a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11134v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Leakage Detection with the x2-Test

Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert
<span title="2018-02-13">2018</span> <i title="Ruhr-Universität Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
In particular, we show that by using these two tests in combination, we can mitigate some of the limitations due to the moment-based nature of existing detection techniques based on Welch's t-test (e.g  ...  as a preliminary before more demanding advanced analyses.  ...  Acknowledgements This work has been funded in part by the European Commission through the H2020 project 731591 (acronym REASSURE) and the ERC project 724725 (acronym SWORD), the German Research Foundation  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2018.i1.209-237">doi:10.13154/tches.v2018.i1.209-237</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/MoradiRSS18.html">dblp:journals/tches/MoradiRSS18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wiswdnab3nhwngrlfygdbkhcgq">fatcat:wiswdnab3nhwngrlfygdbkhcgq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211534/https://tches.iacr.org/index.php/TCHES/article/download/838/790" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/da/52da8ca2c797cdbb218f74fdddba57e11a4e0743.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2018.i1.209-237"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

New Attacks on RSA with Small Secret CRT-Exponents [chapter]

Daniel Bleichenbacher, Alexander May
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Thus, improving these bounds is a major research issue in public key cryptanalysis.  ...  In 1999, Boneh and Durfee[1] improved the bound to d < N 0.292 . One can view these bounds as a benchmark for attacking RSA (see also the comments in the STORK-roadmap [12]).  ...  Acknowledgements: We thank the anonymous reviewers of PKC 2006 for their very helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11745853_1">doi:10.1007/11745853_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/slu7p6mlqnd6li37jzggn4aumq">fatcat:slu7p6mlqnd6li37jzggn4aumq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811230507/http://www.cits.rub.de/imperia/md/content/may/paper/crt.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/07/dd07c808c01b10c038a750be0a04bac4c607d085.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11745853_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 42 results