Abstract is missing.
- Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle. 1-17 [doi]
- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial ServicesMoti Yung, Cem Paya, Daniel James. 18-28 [doi]
- Security Ranking of IoT Devices Using an AHP ModelShachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici. 29-44 [doi]
- Robust Malicious Domain DetectionNitay Hason, Amit Dvir, Chen Hajaj. 45-61 [doi]
- NeuroGIFT: Using a Machine Learning Based Sat Solver for CryptanalysisLing Sun 0001, David Gerault, Adrien Benamira, Thomas Peyrin. 62-84 [doi]
- Can the Operator of a Drone Be Located by Following the Drone's Path?Eliyahu Mashhadi, Yossi Oren, Gera Weiss. 85-93 [doi]
- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised LearningNitesh Kumar, Ajay Singh, Anand Handa, Sandeep Kumar Shukla. 94-109 [doi]
- Fast Polynomial Inversion for Post Quantum QC-MDPC CryptographyNir Drucker, Shay Gueron, Dusan Kostic. 110-127 [doi]
- Efficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture - (Extended Abstract)Daniel Khankin, Elad Raz, Ilan Tayari. 128-142 [doi]
- SecureMCMR: Computation Outsourcing for MapReduce ApplicationsLindsey Kennard, Ana Milanova. 143-166 [doi]
- Evasion Is Not Enough: A Case Study of Android MalwareHarel Berger, Chen Hajaj, Amit Dvir. 167-174 [doi]
- Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version)Shlomi Dolev, Matan Liber. 175-192 [doi]
- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHEImtiyazuddin Shaik, Ajeet Kumar Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar. 193-218 [doi]
- Comparison of DNS Based Methods for Detecting Malicious DomainsEyal Paz, Ehud Gudes. 219-236 [doi]
- Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user CacheDaniel Berend, Shlomi Dolev, Avinatan Hassidim, Marina Kogan-Sadetsky. 237-244 [doi]
- CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic EncryptionMaya Bakshi, Mark Last. 245-253 [doi]