Login / Signup
SECITC
2015
2018
2021
2015
2021
Keyphrases
Publications
volume 12596, 2021
Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers
SECITC
12596 (2021)
2020
Tung Chou
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM.
SECITC
(2020)
Yuto Shinoda
,
Daiki Miyahara
,
Kazumasa Shinagawa
,
Takaaki Mizuki
,
Hideaki Sone
Card-Based Covert Lottery.
SECITC
(2020)
Diana Maimut
,
George Teseleanu
-Residuosity Assumption.
SECITC
(2020)
Kashi Neupane
Long-Term Secure Deniable Group Key Establishment.
SECITC
(2020)
Mihai-Cristian Chindris
,
Mihai Togan
,
Stefan-Ciprian Arseni
Secure Speaker Recognition System Using Homomorphic Encryption.
SECITC
(2020)
Hiroaki Anada
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers.
SECITC
(2020)
Shurook S. Almohamade
,
John A. Clark
,
James Law
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots.
SECITC
(2020)
Ion Bica
,
Roxana Larisa Unc
,
Stefan Turcanu
Virtualization and Automation for Cybersecurity Training and Experimentation.
SECITC
(2020)
Yuanzhen Liu
,
Gerhard Petrus Hancke
,
Umair Mujtaba Qureshi
Off-the-Shelf Security Testing Platform for Contactless Systems.
SECITC
(2020)
Yoshifumi Manabe
,
Hibiki Ono
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players.
SECITC
(2020)
Cristian Hristea
Reliable RFID Offline Privacy.
SECITC
(2020)
Rémi Géraud-Stewart
,
David Naccache
Elementary Attestation of Cryptographically Useful Composite Moduli.
SECITC
(2020)
Lukas Malina
,
David Smekal
,
Sara Ricci
,
Jan Hajny
,
Peter Cíbik
,
Jakub Hrabovsky
Hardware-Accelerated Cryptography for Software-Defined Networks with P4.
SECITC
(2020)
Anubhab Baksi
New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming.
SECITC
(2020)
Andreea-Elena Panait
,
Ruxandra F. Olimid
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management.
SECITC
(2020)
Mihai-Zicu Mina
,
Emil Simion
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping.
SECITC
(2020)
Nasser Al-Hadhrami
,
Matthew Collinson
,
Nir Oren
Security Analysis Using Subjective Attack Trees.
SECITC
(2020)
David Pecl
,
Yehor Safonov
,
Zdenek Martinasek
,
Matej Kacic
,
Lubomir Almer
,
Lukas Malina
Manager Asks: Which Vulnerability Must be Eliminated First?
SECITC
(2020)
Tetsuya Nagano
,
Hiroaki Anada
Approach to Cryptography from Differential Geometry with Example.
SECITC
(2020)
2019
Satomi Kaneko
,
Akira Yamada
,
Yukiko Sawaya
,
Tran Phuong Thao
,
Ayumu Kubota
,
Kazumasa Omote
Detecting Malicious Websites by Query Templates.
SECITC
(2019)
Marc Beunardeau
,
Fatima-Ezzahra El Orche
,
Diana Maimut
,
David Naccache
,
Peter B. Rønne
,
Peter Y. A. Ryan
Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
SECITC
(2019)
Iulian Aciobanitei
,
Paul-Danut Urian
,
Mihai-Lica Pura
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API.
SECITC
(2019)
Sandra Rasoamiaramanana
,
Gilles Macario-Rat
,
Marine Minier
White-Box Traitor-Tracing from Tardos Probabilistic Codes.
SECITC
(2019)
Mariana Costiuc
,
Diana Maimut
,
George Teseleanu
Physical Cryptography.
SECITC
(2019)
Ion Bica
,
Bogdan-Cosmin Chifor
,
Stefan-Ciprian Arseni
,
Ioana Matei
Reputation-Based Security Framework for Internet of Things.
SECITC
(2019)
Giovanni Di Crescenzo
,
Abhrajit Sengupta
,
Ozgur Sinanoglu
,
Muhammad Yasin
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory.
SECITC
(2019)
Mohammed Zitouni
,
Farid Mokrane
+a, x.
SECITC
(2019)
Diana Maimut
,
Alexandru Stefan Mega
Speeding up OMD Instantiations in Hardware.
SECITC
(2019)
Risa Yashiro
,
Yohei Hori
,
Toshihiro Katashita
,
Kazuo Sakiyama
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme.
SECITC
(2019)
Lukas Malina
,
Sara Ricci
,
Petr Dzurenda
,
David Smekal
,
Jan Hajny
,
Tomas Gerlich
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
SECITC
(2019)
Mario Bischof
,
Tobias Oder
,
Tim Güneysu
Efficient Microcontroller Implementation of BIKE.
SECITC
(2019)
Hiroaki Anada
,
Yoshifumi Ueshige
Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability.
SECITC
(2019)
Giovanni Di Crescenzo
,
Brian A. Coan
,
Jonathan Kirsch
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols.
SECITC
(2019)
Camil Jichici
,
Bogdan Groza
,
Pal-Stefan Murvay
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe.
SECITC
(2019)
Natacha Sylvie Laniado
The Ups and Downs of Technology in Society.
SECITC
(2019)
2017
Éric Brier
,
Rémi Géraud
,
David Naccache
Exploring Naccache-Stern Knapsack Encryption.
SECITC
(2017)
Peter Y. A. Ryan
Securing the Foundations of Democracy.
SECITC
(2017)
Damien Vergnaud
Security of Pseudo-Random Number Generators with Input - (Invited Talk).
SECITC
(2017)
Margus Freudenthal
,
Jan Willemson
Challenges of Federating National Data Access Infrastructures.
SECITC
(2017)
Lukasz Krzywiecki
,
Marcin Slowik
Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.
SECITC
(2017)
Dominic Bucerzan
,
Vlad Dragoi
,
Hervé Talé Kalachi
Evolution of the McEliece Public Key Encryption Scheme.
SECITC
(2017)
Sylvain Guilley
,
Annelie Heuser
,
Ming Tang
,
Olivier Rioul
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.
SECITC
(2017)
Ferucio Laurentiu Tiplea
,
Constantin Catalin Dragan
,
Anca-Maria Nica
Key-Policy Attribute-Based Encryption from Bilinear Maps.
SECITC
(2017)
Iakovos Gurulian
,
Konstantinos Markantonakis
,
Carlton Shepherd
,
Eibe Frank
,
Raja Naeem Akram
Proximity Assurances Based on Natural and Artificial Ambient Environments.
SECITC
(2017)
Mugurel Barcau
,
Vicentiu Pasol
,
Cezar Plesca
,
Mihai Togan
On a Key Exchange Protocol.
SECITC
(2017)
Diana Maimut
,
George Teseleanu
Secretly Embedding Trapdoors into Contract Signing Protocols.
SECITC
(2017)
Claudio Orlandi
Faster Zero-Knowledge Protocols and Applications - (Invited Talk Abstract).
SECITC
(2017)
Yu Sasaki
,
Yosuke Todo
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.
SECITC
(2017)
volume 10006, 2016
Innovative Security Solutions for Information Technology and Communications - 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers
SECITC
10006 (2016)