Abstract is missing.
- Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure InferenceMoran Baruch, Nir Drucker, Gilad Ezov, Yoav Goldberg, Eyal Kushnir, Jenny Lerner, Omri Soceanu, Itamar Zimerman. 3-25 [doi]
- Password-Authenticated Cryptography from Consumable TokensGhada Almashaqbeh. 26-44 [doi]
- Robust Secure Aggregation for Co-located IoT Devices with Corruption LocalizationGiovanni Di Crescenzo, Elina van Kempen, Gene Tsudik. 45-63 [doi]
- Spoofing-Robust Speaker Verification Based on Time-Domain EmbeddingAvishai Weizman, Yehuda Ben-Shimol, Itshak Lapidot. 64-78 [doi]
- Provable Imbalanced Point ClusteringDavid Denisov, Dan Feldman, Shlomi Dolev, Michael Segal 0001. 79-91 [doi]
- Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted Data - - Short Paper -Nir Drucker, Shay Gueron. 92-99 [doi]
- LLMSecCode: Evaluating Large Language Models for Secure CodingAnton Rydén, Erik Näslund, Elad Michael Schiller, Magnus Almgren. 100-118 [doi]
- Distributed Verifiable Random Function with Compact ProofAhmet Ramazan Agirtas, Arda Bugra Özer, Zülfükar Saygi, Oguz Yayla. 119-134 [doi]
- Fiat-Shamir in the WildHieu Nguyen, Uyen Ho, Alex Biryukov. 135-150 [doi]
- Predicting the Degradation Rate of Technical Systems at Early Stages of DevelopmentSergey Frenkel. 151-167 [doi]
- Reminisce for Securing Private-Keys in PublicShlomi Dolev, Komal Kumari, Sharad Mehrotra, Baruch Schieber, Shantanu Sharma 0001. 168-177 [doi]
- Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access PatternsLenise M. V. Rodrigues, Daniel Sadoc Menasché, Arthur C. Serra, Antônio Augusto de Aragão Rocha. 178-189 [doi]
- A Probabilistic Model for Rounding Errors: A New Look at the Table-Maker's DilemmaJonathan Devor, Daniel Khankin, Oded Margalit. 190-200 [doi]
- On the Effects of Neural Network-Based Output Prediction Attacks on the Design of Symmetric-Key CiphersHayato Watanabe, Ryoma Ito 0001, Toshihiro Ohigashi. 201-218 [doi]
- Entanglement-Based Mutual Quantum Distance BoundingAysajan Abidin, Karim Eldefrawy, Dave Singelée. 219-235 [doi]
- Evaluation of Posits for Spectral Analysis Using a Software-Defined Dataflow ArchitectureSameer Deshmukh, Daniel Khankin, William Killian, John Gustafson, Elad Raz. 236-253 [doi]
- Access Policy Prediction via User BehaviorShmuel Amour, Ehud Gudes. 257-267 [doi]
- On the Overflow and p-adic Theory Applied to Homomorphic EncryptionJacob A. Blindenbach, Jung Hee Cheon, Gamze Gürsoy, Jiayi Kang. 268-279 [doi]
- Beneath the Cream: Unveiling Relevant Information Points from CrimeBB with Its Ground Truth LabelsFelipe Moreno Vera, Daniel Sadoc Menasché, Cabral Lima. 280-290 [doi]
- Cybersecurity Enhancement for Wireless Networks Using Aerial Reconfigurable Intelligent SurfacesRajnish Kumar, Shlomi Arnon. 291-298 [doi]
- KNN+XDaniel Gilkarov, Lee-Ad Gottlieb, Hillel Ohayon. 299-309 [doi]
- Challenges in Timed-Cryptography: A Position Paper (Short Paper)Karim Eldefrawy, Ben Terner, Moti Yung. 310-321 [doi]
- Post Quantum Lightweight OWF Candidates - Based on Theoretically Secure Primitives: Xors, Error Detection Codes, Permutations, Polynomials, Interaction, and Nesting (Short Version)Pawel Cyprys, Shlomi Dolev, Oded Margalit. 322-334 [doi]
- Super-Teaching in Machine LearningDina Barak-Pelleg, Daniel Berend, Aryeh Kontorovich. 335-342 [doi]
- A Lattice Attack Against a Family of RSA-Like CryptosystemsGeorge Teseleanu. 343-355 [doi]
- On the Security Related Properties of Randomly Constructed Combinatorial StructuresVasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. 356-367 [doi]
- HBSS+: Simple Hash-Based Stateless Signatures Revisited - (Preliminary Version, Short Paper)Przemyslaw Kubiak 0001, Oliwer Sobolewski. 368-379 [doi]