181 | -- | 190 | Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks |
191 | -- | 198 | Mostafa E. Saleh, A. Baith Mohamed, A. Abdel Nabi. Eigenviruses for metamorphic virus recognition |
199 | -- | 206 | Aleksandar Kircanski, Amr M. Youssef. On the sliding property of SNOW 3 G and SNOW 2.0 |
207 | -- | 219 | Alexandra Boldyreva, Virendra Kumar. Provable-security analysis of authenticated encryption in Kerberos |
220 | -- | 227 | Igor Santos, Felix Brezo, Borja Sanz, Carlos Laorden, Pablo Garcia Bringas. Using opcode sequences in single-class learning to detect unknown malware |
228 | -- | 236 | Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala. Perfect involutory diffusion layers based on invertibility of some linear functions |