Abstract is missing.
- Localhost Detour from Public to Private NetworksYehuda Afek, Anat Bremler-Barr, Dor Israeli, Alon Noy. 1-17 [doi]
- Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group ComputationMadhurima Mukhopadhyay, Palash Sarkar 0001. 18-31 [doi]
- Efficient Extended GCD and Class Groups from Secure Integer ArithmeticBerry Schoenmakers, Toon Segers. 32-48 [doi]
- On Distributed Randomness Generation in BlockchainsIlan Komargodski, Yoav Tamir. 49-64 [doi]
- Efficient Skip Connections Realization for Secure Inference on Encrypted DataNir Drucker, Itamar Zimerman. 65-73 [doi]
- Single Instance Self-masking via Permutations - (Preliminary Version)Asaf Cohen 0001, Pawel Cyprys, Shlomi Dolev. 74-84 [doi]
- A Fusion-Based Framework for Unsupervised Single Image Super-ResolutionDivya Mishra, Itai Dror, Ofer Hadar, Daniel Choukroun, Shimrit Maman, Dan G. Blumberg. 85-95 [doi]
- Generating One-Hot Maps Under EncryptionEhud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul. 96-116 [doi]
- Building Blocks for LSTM Homomorphic Evaluation with TFHEDaphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey. 117-134 [doi]
- CANdito: Improving Payload-Based Detection of Attacks on Controller Area NetworksStefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati, Stefano Zanero. 135-150 [doi]
- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and IsraelDeborah Novick, Mark Last. 151-169 [doi]
- A Bag of Tokens Neural Network to Predict Webpage AgeKlaas Meinke, Tamis Achilles van der Laan, Tiberiu Iancu, Ceyhun Cakir. 170-180 [doi]
- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and PermutationsSubhabrata Samajder, Palash Sarkar 0001. 181-187 [doi]
- PPAuth: A Privacy-Preserving Framework for Authentication of Digital ImageRiyanka Jena, Priyanka Singh, Manoranjan Mohanty. 188-199 [doi]
- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMOGeorge Vershinin, Asaf Cohen 0001, Omer Gurewitz. 200-215 [doi]
- The Use of Performance-Countersto Perform Side-Channel AttacksRon Segev, Avi Mendelson. 216-233 [doi]
- HAMLET: A Transformer Based Approach for Money Laundering DetectionMaria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati, Stefano Zanero. 234-250 [doi]
- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing AttacksJiayi Tan, Dipti Kapoor Sarmah. 251-272 [doi]
- Practical Improvements on BKZ AlgorithmZiyu Zhao, Jintai Ding. 273-284 [doi]
- Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance CorrectionFaithful Chiagoziem Onwuegbuche, Anca Delia Jurcut, Liliana Pasquale. 285-295 [doi]
- A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural NetworksJakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin. 296-306 [doi]
- New Approach for Sine and Cosine in Secure Fixed-Point ArithmeticStan Korzilius, Berry Schoenmakers. 307-319 [doi]
- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEsMadhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay. 320-336 [doi]
- Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion AttacksStefano Longari, Francesco Noseda, Michele Carminati, Stefano Zanero. 337-352 [doi]
- On Adaptively Secure Prefix Encryption Under LWEGiorgos Zirdelis. 353-371 [doi]
- SigML: Supervised Log Anomaly with Fully Homomorphic EncryptionDevharsh Trivedi, Aymen Boudguiga, Nikos Triandopoulos. 372-388 [doi]
- HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version)Shlomi Dolev, Avraam Yagudaev, Moti Yung. 389-397 [doi]
- Improving Performance in Space-Hard AlgorithmsHatice Kübra Güner, Ceyda Mangir, Oguz Yayla. 398-410 [doi]
- A Survey of Security Challenges in Automatic Identification System (AIS) ProtocolSilvie Levy, Ehud Gudes, Danny Hendler. 411-423 [doi]
- A New Interpretation for the GHASH Authenticator of AES-GCMShay Gueron. 424-438 [doi]
- Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-OffVladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang. 439-457 [doi]
- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing AttacksRajnish Kumar, Shlomi Arnon. 458-470 [doi]
- Midgame Attacks and Defense Against ThemDonghoon Chang, Moti Yung. 471-492 [doi]
- Deep Neural Networks for Encrypted Inference with TFHEAndrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames. 493-500 [doi]
- On the Existence of Highly Organized Communities in Networks of Locally Interacting AgentsVasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. 501-510 [doi]
- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub PagesLucas Miranda, Cainã Figueiredo, Daniel Sadoc Menasché, Anton Kocheturov. 511-522 [doi]