researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Cezar Plesca
David Naccache
Diana Maimut
Dominic Bucerzan
Emil Simion
Ferucio Laurentiu Tiplea
George Teseleanu
Giovanni Di Crescenzo
Hiroaki Anada
Ion Bica
Johann Großschädl
Kashi Neupane
Kazuo Sakiyama
Lukas Malina
Mihai Togan
Monica Borda
Mugurel Barcau
Paul Irofti
Rémi Géraud
Sylvain Guilley
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
authentication
communications
conference
cryptography
detection
encryption
information
innovative
international
key
papers
revised
scheme
secitc
secure
security
solutions
technology
using
SECITC (secitc)
Editions
Publications
Viewing Publication 1 - 100 from 189
2024
Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers
Mark Manulis
,
Diana Maimut
,
George Teseleanu
, editors,
Volume 14534 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
Software Mitigation of RISC-V Spectre Attacks
Ruxandra Balucea
,
Paul Irofti
.
secitc 2024
:
51-64
[doi]
Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Giampaolo Bella
,
Mihai Doinea
,
Helge Janicke
, editors,
Volume 13809 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes
Paul Cotan
,
George Teseleanu
.
secitc 2024
:
26-34
[doi]
BASS: Boolean Automorphisms Signature Scheme
Dima Grigoriev
,
Ilia Ilmer
,
Alexey Ovchinnikov
,
Vladimir Shpilrain
.
secitc 2024
:
1-12
[doi]
Pinky: A Modern Malware-Oriented Dynamic Information Retrieval Tool
Paul Irofti
.
secitc 2024
:
65-78
[doi]
M-Sel: A Message Selection Functional Encryption from Simple Tools
Ahmad Khoureich Ka
.
secitc 2024
:
79-96
[doi]
An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing
Matluba Khodjaeva
,
Giovanni Di Crescenzo
.
secitc 2024
:
157-177
[doi]
OpenBSD Formal Driver Verification with SeL4
Adriana Nicolae
,
Paul Irofti
,
Ioana Leustean
.
secitc 2024
:
144-156
[doi]
Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit
Mario Noseda
,
Simon Künzli
.
secitc 2024
:
126-143
[doi]
Learning Burnside Homomorphisms with Rounding and Pseudorandom Function
Dhiraj K. Pandey
,
Antonio R. Nicolosi
.
secitc 2024
:
178-196
[doi]
Some Results on Related Key-IV Pairs of Espresso
George Teseleanu
.
secitc 2024
:
197-216
[doi]
Towards a Secure and Transparent Blockchain-Based System for e-Commerce Deliveries
Anastasia Theodouli
,
Evdoxia Manganopoulou
,
Athanasios Kalfoutzos
,
Athanasios Tzikas
,
Christos Tsislianis
,
Dimosthenis Ioannidis
,
Konstantinos Votis
,
Dimitrios Tzovaras
.
secitc 2024
:
113-125
[doi]
SDVS Sender-Privacy in the Multi-party Setting
Jeroen van Wier
.
secitc 2024
:
35-50
[doi]
Deniable Public-Key Authenticated Quantum Key Exchange
Jeroen van Wier
,
Arash Atashpendar
,
Peter B. Rønne
.
secitc 2024
:
97-112
[doi]
Using Page Offsets for Detecting Control-Flow Anomalies
Engincan Varan
,
Khadija Hanifi
,
Aysegul Rana Erdemli
,
Musa Unal
,
Yunus Emre Tat
,
Dilara Tekinoglu
,
Orçun Çetin
,
Ramin Fuladi
,
Cemal Yilmaz
.
secitc 2024
:
13-25
[doi]
2022
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures
Takuya Ishibashi 0001
,
Toshihiro Ohigashi
,
Hikaru Tsuchida
.
secitc 2023
:
320-339
[doi]
Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists
Emanuele Bellini 0002
,
Yun-Ju Huang
,
Mohamed Rachidi
.
secitc 2023
:
133-152
[doi]
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
Malik Alsahli
,
Alex Borgognoni
,
Luan Cardoso dos Santos
,
Hao Cheng
,
Christian Franck
,
Johann Großschädl
.
secitc 2023
:
17-36
[doi]
Bridges Connecting Encryption Schemes
Mugurel Barcau
,
Cristian Lupascu
,
Vicentiu Pasol
,
George C. Turcas
.
secitc 2023
:
37-64
[doi]
Interactional Freedom and Cybersecurity
Giampaolo Bella
.
secitc 2023
:
1-16
[doi]
Superpoly Recovery of Grain-128AEAD Using Division Property
Debasmita Chakraborty
,
Santu Pal
.
secitc 2023
:
65-80
[doi]
On Single-Server Delegation of RSA
Giovanni Di Crescenzo
,
Matluba Khodjaeva
,
Ta Chen
,
Rajesh Krishnan
,
David Shur
,
Delaram Kahrobaei
,
Vladimir Shpilrain
.
secitc 2023
:
81-101
[doi]
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
Subhranil Dutta
,
Ratna Dutta
,
Sourav Mukhopadhyay
.
secitc 2023
:
102-116
[doi]
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
Amirreza Hamidi
,
Hossein Ghodosi
.
secitc 2023
:
117-132
[doi]
MILP-Aided Cryptanalysis of the FUTURE Block Cipher
Murat Burhan Ilter
,
Ali Aydin Selçuk
.
secitc 2023
:
153-167
[doi]
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
Ahmad Khoureich Ka
.
secitc 2023
:
168-183
[doi]
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input
Hiromasa Kitai
,
Naoto Yanai
,
Kazuki Iwahana
,
Masataka Tatsumi
,
Jason Paul Cruz
.
secitc 2023
:
184-202
[doi]
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
Yuichi Komano
,
Takaaki Mizuki
.
secitc 2023
:
222-239
[doi]
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function
Yuichi Komano
,
Mitsugu Iwamoto
,
Kazuo Ohta
,
Kazuo Sakiyama
.
secitc 2023
:
203-221
[doi]
Activity Detection from Encrypted Remote Desktop Protocol Traffic
Lukasz Lapczyk
,
David B. Skillicorn
.
secitc 2023
:
240-260
[doi]
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments
Jana Medková
,
Josef Hynek
.
secitc 2023
:
261-274
[doi]
AI-Powered Vulnerability Detection for Secure Source Code Development
Sampath Rajapaksha
,
Janaka Senanayake
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
.
secitc 2023
:
275-288
[doi]
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers
Peter Y. A. Ryan
,
Cristian Toma
, editors,
Volume 13195 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Towards Verifying Physical Assumption in Card-Based Cryptography
Masahisa Shimano
,
Kazuo Sakiyama
,
Daiki Miyahara
.
secitc 2023
:
289-305
[doi]
The Security of Quasigroups Based Substitution Permutation Networks
George Teseleanu
.
secitc 2023
:
306-319
[doi]
2021
Limitations of the Use of Neural Networks in Black Box Cryptanalysis
Emanuele Bellini 0002
,
Anna Hambitzer
,
Matteo Protopapa
,
Matteo Rossi
.
secitc 2022
:
100-124
[doi]
Identification of Data Breaches from Public Forums
Md. Akhtaruzzaman Adnan
,
Atika Younus
,
Md. Harun Al Kawser
,
Natasha Adhikary
,
Ahsan Habib
,
Rakib Ul Haque
.
secitc 2022
:
46-56
[doi]
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch
Romain Brisse
,
Simon Boche
,
Frédéric Majorczyk
,
Jean-François Lalande
.
secitc 2022
:
1-17
[doi]
Building Deobfuscated Applications from Polymorphic Binaries
Vlad Constantin Craciun
,
Andrei-Catalin Mogage
.
secitc 2022
:
308-323
[doi]
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations
Luan Cardoso dos Santos
,
Johann Großschädl
.
secitc 2022
:
70-85
[doi]
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things
Li Duan
,
Yong Li 0021
,
Lijun Liao
.
secitc 2022
:
190-209
[doi]
Flexible Group Non-interactive Key Exchange in the Standard Model
Li Duan
,
Yong Li 0021
,
Lijun Liao
.
secitc 2022
:
210-227
[doi]
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers
Christian Franck
,
Johann Großschädl
.
secitc 2022
:
86-99
[doi]
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing
Marian Gusatu
,
Ruxandra F. Olimid
.
secitc 2022
:
286-295
[doi]
An Optimization of Bleichenbacher's Oracle Padding Attack
Evgnosia-Alexandra Kelesidis
.
secitc 2022
:
145-155
[doi]
Conditional Differential Cryptanalysis on Bagua
Xiaojuan Lu
,
Bohan Li 0004
,
Shichang Wang
,
Dongdai Lin
.
secitc 2022
:
178-189
[doi]
Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers
Diana Maimut
,
Andrei-George Oprina
,
Damien Sauveron
, editors,
Volume 12596 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
New Configurations of Grain Ciphers: Security Against Slide Attacks
Diana Maimut
,
George Teseleanu
.
secitc 2022
:
260-285
[doi]
A Forensic Framework for Webmail Threat Detection Using Log Analysis
Abdul Saboor Malik
,
Muhammad Khuram Shahzad
,
Mehdi Hussain
.
secitc 2022
:
57-69
[doi]
A Multifunctional Modular Implementation of Grover's Algorithm
Mihai-Zicu Mina
,
Emil Simion
.
secitc 2022
:
228-247
[doi]
Long-Term Secure Asymmetric Group Key Agreement
Kashi Neupane
.
secitc 2022
:
296-307
[doi]
Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$
Suthee Ruangwises
.
secitc 2022
:
165-177
[doi]
Lightweight Swarm Authentication
George Teseleanu
.
secitc 2022
:
248-259
[doi]
Viruses, Exploits, Malware and Security Issues on IoT Devices
Cristian Toma
,
Catalin Boja
,
Marius Popa
,
Mihai Doinea
,
Cristian Ciurea
.
secitc 2022
:
324-334
[doi]
ADAM: Automatic Detection of Android Malware
Somanath Tripathy
,
Narendra Singh
,
Divyanshu N. Singh
.
secitc 2022
:
18-31
[doi]
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime
Esra Yeniaras
,
Murat Cenk
.
secitc 2022
:
125-144
[doi]
UC Analysis of the Randomized McEliece Cryptosystem
Dániel Zentai
.
secitc 2022
:
156-164
[doi]
Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem
Xiaona Zhang
,
Yang Liu
,
Yu Chen
.
secitc 2022
:
32-45
[doi]
2020
Security Analysis Using Subjective Attack Trees
Nasser Al-Hadhrami
,
Matthew Collinson
,
Nir Oren
.
secitc 2021
:
288-301
[doi]
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots
Shurook S. Almohamade
,
John A. Clark
,
James Law
.
secitc 2021
:
185-197
[doi]
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers
Hiroaki Anada
.
secitc 2021
:
71-90
[doi]
New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming
Anubhab Baksi
.
secitc 2021
:
41-54
[doi]
Virtualization and Automation for Cybersecurity Training and Experimentation
Ion Bica
,
Roxana Larisa Unc
,
Stefan Turcanu
.
secitc 2021
:
227-241
[doi]
Secure Speaker Recognition System Using Homomorphic Encryption
Mihai-Cristian Chindris
,
Mihai Togan
,
Stefan-Ciprian Arseni
.
secitc 2021
:
198-211
[doi]
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM
Tung Chou
.
secitc 2021
:
165-184
[doi]
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart
,
David Naccache
.
secitc 2021
:
1-12
[doi]
Reliable RFID Offline Privacy
Cristian Hristea
.
secitc 2021
:
212-226
[doi]
Off-the-Shelf Security Testing Platform for Contactless Systems
Yuanzhen Liu
,
Gerhard Petrus Hancke
,
Umair Mujtaba Qureshi
.
secitc 2021
:
13-23
[doi]
k-Residuosity Assumption
Diana Maimut
,
George Teseleanu
.
secitc 2021
:
24-40
[doi]
Hardware-Accelerated Cryptography for Software-Defined Networks with P4
Lukas Malina
,
David Smekal
,
Sara Ricci
,
Jan Hajny
,
Peter Cíbik
,
Jakub Hrabovsky
.
secitc 2021
:
271-287
[doi]
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players
Yoshifumi Manabe
,
Hibiki Ono
.
secitc 2021
:
55-70
[doi]
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina
,
Emil Simion
.
secitc 2021
:
91-109
[doi]
Approach to Cryptography from Differential Geometry with Example
Tetsuya Nagano
,
Hiroaki Anada
.
secitc 2021
:
110-129
[doi]
Long-Term Secure Deniable Group Key Establishment
Kashi Neupane
.
secitc 2021
:
242-256
[doi]
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management
Andreea-Elena Panait
,
Ruxandra F. Olimid
.
secitc 2021
:
130-145
[doi]
Manager Asks: Which Vulnerability Must be Eliminated First?
David Pecl
,
Yehor Safonov
,
Zdenek Martinasek
,
Matej Kacic
,
Lubomir Almer
,
Lukas Malina
.
secitc 2021
:
146-164
[doi]
Card-Based Covert Lottery
Yuto Shinoda
,
Daiki Miyahara
,
Kazumasa Shinagawa
,
Takaaki Mizuki
,
Hideaki Sone
.
secitc 2021
:
257-270
[doi]
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers
Emil Simion
,
Rémi Géraud-Stewart
, editors,
Volume 12001 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
2019
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API
Iulian Aciobanitei
,
Paul-Danut Urian
,
Mihai-Lica Pura
.
secitc 2020
:
227-240
[doi]
Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability
Hiroaki Anada
,
Yoshifumi Ueshige
.
secitc 2020
:
142-155
[doi]
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau
,
Fatima-Ezzahra El Orche
,
Diana Maimut
,
David Naccache
,
Peter B. Rønne
,
Peter Y. A. Ryan
.
secitc 2020
:
1-20
[doi]
Reputation-Based Security Framework for Internet of Things
Ion Bica
,
Bogdan-Cosmin Chifor
,
Stefan-Ciprian Arseni
,
Ioana Matei
.
secitc 2020
:
213-226
[doi]
Efficient Microcontroller Implementation of BIKE
Mario Bischof
,
Tobias Oder
,
Tim Güneysu
.
secitc 2020
:
34-49
[doi]
Physical Cryptography
Mariana Costiuc
,
Diana Maimut
,
George Teseleanu
.
secitc 2020
:
156-171
[doi]
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols
Giovanni Di Crescenzo
,
Brian A. Coan
,
Jonathan Kirsch
.
secitc 2020
:
50-64
[doi]
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory
Giovanni Di Crescenzo
,
Abhrajit Sengupta
,
Ozgur Sinanoglu
,
Muhammad Yasin
.
secitc 2020
:
172-192
[doi]
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe
Camil Jichici
,
Bogdan Groza
,
Pal-Stefan Murvay
.
secitc 2020
:
241-256
[doi]
Detecting Malicious Websites by Query Templates
Satomi Kaneko
,
Akira Yamada
,
Yukiko Sawaya
,
Tran Phuong Thao
,
Ayumu Kubota
,
Kazumasa Omote
.
secitc 2020
:
65-77
[doi]
Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers
Jean-Louis Lanet
,
Cristian Toma
, editors,
Volume 11359 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
The Ups and Downs of Technology in Society
Natacha Sylvie Laniado
.
secitc 2020
:
21-33
[doi]
Speeding up OMD Instantiations in Hardware
Diana Maimut
,
Alexandru Stefan Mega
.
secitc 2020
:
193-212
[doi]
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms
Lukas Malina
,
Sara Ricci
,
Petr Dzurenda
,
David Smekal
,
Jan Hajny
,
Tomas Gerlich
.
secitc 2020
:
109-124
[doi]
White-Box Traitor-Tracing from Tardos Probabilistic Codes
Sandra Rasoamiaramanana
,
Gilles Macario-Rat
,
Marine Minier
.
secitc 2020
:
125-141
[doi]
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme
Risa Yashiro
,
Yohei Hori
,
Toshihiro Katashita
,
Kazuo Sakiyama
.
secitc 2020
:
78-94
[doi]
5 +a, x
Mohammed Zitouni
,
Farid Mokrane
.
secitc 2020
:
95-108
[doi]
2018
Assuring Privacy in Surfing the Internet
Stefan Bodoarca
,
Mihai-Lica Pura
.
secitc 2019
:
185-203
[doi]
On the Security of Jhanwar-Barua Identity-Based Encryption Scheme
Adrian G. Schipor
.
secitc 2019
:
368-375
[doi]
Roaming Interface Signaling Security for LTE Networks
Isha Singh
,
Silke Holtmanns
,
Raimo Kantola
.
secitc 2019
:
204-217
[doi]
Implementing Searchable Encryption Schemes over Multilinear Maps
Victor-Mihai Talif
.
secitc 2019
:
458-476
[doi]
Sign in
or
sign up
to see more results.