


default search action
8th CSCML 2024: Be'er Sheva, Israel
- Shlomi Dolev

, Michael Elhadad
, Miroslaw Kutylowski
, Giuseppe Persiano
:
Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Be'er Sheva, Israel, December 19-20, 2024, Proceedings. Lecture Notes in Computer Science 15349, Springer 2025, ISBN 978-3-031-76933-7
Regular Papers
- Moran Baruch

, Nir Drucker
, Gilad Ezov
, Yoav Goldberg
, Eyal Kushnir
, Jenny Lerner
, Omri Soceanu
, Itamar Zimerman
:
Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure Inference. 3-25 - Ghada Almashaqbeh:

Password-Authenticated Cryptography from Consumable Tokens. 26-44 - Giovanni Di Crescenzo, Elina van Kempen, Gene Tsudik:

Robust Secure Aggregation for Co-located IoT Devices with Corruption Localization. 45-63 - Avishai Weizman

, Yehuda Ben-Shimol
, Itshak Lapidot
:
Spoofing-Robust Speaker Verification Based on Time-Domain Embedding. 64-78 - David Denisov, Dan Feldman, Shlomi Dolev, Michael Segal:

Provable Imbalanced Point Clustering. 79-91 - Nir Drucker

, Shay Gueron
:
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted Data - - Short Paper -. 92-99 - Anton Rydén, Erik Näslund, Elad Michael Schiller

, Magnus Almgren
:
LLMSecCode: Evaluating Large Language Models for Secure Coding. 100-118 - Ahmet Ramazan Agirtas

, Arda Bugra Özer
, Zülfükar Saygi
, Oguz Yayla
:
Distributed Verifiable Random Function with Compact Proof. 119-134 - Hieu Nguyen, Uyen Ho, Alex Biryukov:

Fiat-Shamir in the Wild. 135-150 - Sergey Frenkel:

Predicting the Degradation Rate of Technical Systems at Early Stages of Development. 151-167 - Shlomi Dolev, Komal Kumari, Sharad Mehrotra, Baruch Schieber, Shantanu Sharma:

Reminisce for Securing Private-Keys in Public. 168-177 - Lenise M. V. Rodrigues, Daniel Sadoc Menasché, Arthur C. Serra, Antônio Augusto de Aragão Rocha:

Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access Patterns. 178-189 - Jonathan Devor

, Daniel Khankin
, Oded Margalit
:
A Probabilistic Model for Rounding Errors: A New Look at the Table-Maker's Dilemma. 190-200 - Hayato Watanabe, Ryoma Ito

, Toshihiro Ohigashi:
On the Effects of Neural Network-Based Output Prediction Attacks on the Design of Symmetric-Key Ciphers. 201-218 - Aysajan Abidin, Karim Eldefrawy, Dave Singelée:

Entanglement-Based Mutual Quantum Distance Bounding. 219-235 - Sameer Deshmukh

, Daniel Khankin, William Killian, John Gustafson, Elad Raz:
Evaluation of Posits for Spectral Analysis Using a Software-Defined Dataflow Architecture. 236-253
Short Papers
- Shmuel Amour, Ehud Gudes:

Access Policy Prediction via User Behavior. 257-267 - Jacob A. Blindenbach, Jung Hee Cheon

, Gamze Gürsoy
, Jiayi Kang
:
On the Overflow and p-adic Theory Applied to Homomorphic Encryption. 268-279 - Felipe Moreno Vera, Daniel Sadoc Menasché, Cabral Lima:

Beneath the Cream: Unveiling Relevant Information Points from CrimeBB with Its Ground Truth Labels. 280-290 - Rajnish Kumar

, Shlomi Arnon
:
Cybersecurity Enhancement for Wireless Networks Using Aerial Reconfigurable Intelligent Surfaces. 291-298 - Daniel Gilkarov

, Lee-Ad Gottlieb, Hillel Ohayon
:
KNN+X. 299-309 - Karim Eldefrawy, Ben Terner, Moti Yung:

Challenges in Timed-Cryptography: A Position Paper (Short Paper). 310-321 - Pawel Cyprys, Shlomi Dolev, Oded Margalit:

Post Quantum Lightweight OWF Candidates - Based on Theoretically Secure Primitives: Xors, Error Detection Codes, Permutations, Polynomials, Interaction, and Nesting (Short Version). 322-334 - Dina Barak-Pelleg

, Daniel Berend
, Aryeh Kontorovich
:
Super-Teaching in Machine Learning. 335-342 - George Teseleanu

:
A Lattice Attack Against a Family of RSA-Like Cryptosystems. 343-355 - Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:

On the Security Related Properties of Randomly Constructed Combinatorial Structures. 356-367 - Przemyslaw Kubiak

, Oliwer Sobolewski
:
HBSS+: Simple Hash-Based Stateless Signatures Revisited - (Preliminary Version, Short Paper). 368-379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














