![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
8th CSCML 2024: Be'er Sheva, Israel
- Shlomi Dolev
, Michael Elhadad
, Miroslaw Kutylowski
, Giuseppe Persiano
:
Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Be'er Sheva, Israel, December 19-20, 2024, Proceedings. Lecture Notes in Computer Science 15349, Springer 2025, ISBN 978-3-031-76933-7
Regular Papers
- Moran Baruch
, Nir Drucker
, Gilad Ezov
, Yoav Goldberg
, Eyal Kushnir
, Jenny Lerner
, Omri Soceanu
, Itamar Zimerman
:
Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure Inference. 3-25 - Ghada Almashaqbeh:
Password-Authenticated Cryptography from Consumable Tokens. 26-44 - Giovanni Di Crescenzo, Elina van Kempen, Gene Tsudik:
Robust Secure Aggregation for Co-located IoT Devices with Corruption Localization. 45-63 - Avishai Weizman, Yehuda Ben-Shimol
, Itshak Lapidot
:
Spoofing-Robust Speaker Verification Based on Time-Domain Embedding. 64-78 - David Denisov, Dan Feldman, Shlomi Dolev, Michael Segal:
Provable Imbalanced Point Clustering. 79-91 - Nir Drucker
, Shay Gueron
:
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted Data - - Short Paper -. 92-99 - Anton Rydén, Erik Näslund, Elad Michael Schiller
, Magnus Almgren
:
LLMSecCode: Evaluating Large Language Models for Secure Coding. 100-118 - Ahmet Ramazan Agirtas
, Arda Bugra Özer
, Zülfükar Saygi, Oguz Yayla
:
Distributed Verifiable Random Function with Compact Proof. 119-134 - Hieu Nguyen, Uyen Ho, Alex Biryukov:
Fiat-Shamir in the Wild. 135-150 - Sergey Frenkel:
Predicting the Degradation Rate of Technical Systems at Early Stages of Development. 151-167 - Shlomi Dolev, Komal Kumari, Sharad Mehrotra, Baruch Schieber, Shantanu Sharma:
Reminisce for Securing Private-Keys in Public. 168-177 - Lenise M. V. Rodrigues, Daniel Sadoc Menasché, Arthur C. Serra, Antônio Augusto de Aragão Rocha:
Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access Patterns. 178-189 - Jonathan Devor, Daniel Khankin
, Oded Margalit
:
A Probabilistic Model for Rounding Errors: A New Look at the Table-Maker's Dilemma. 190-200 - Hayato Watanabe, Ryoma Ito
, Toshihiro Ohigashi:
On the Effects of Neural Network-Based Output Prediction Attacks on the Design of Symmetric-Key Ciphers. 201-218 - Aysajan Abidin, Karim Eldefrawy, Dave Singelée:
Entanglement-Based Mutual Quantum Distance Bounding. 219-235 - Sameer Deshmukh
, Daniel Khankin, William Killian, John Gustafson, Elad Raz:
Evaluation of Posits for Spectral Analysis Using a Software-Defined Dataflow Architecture. 236-253
Short Papers
- Shmuel Amour, Ehud Gudes:
Access Policy Prediction via User Behavior. 257-267 - Jacob A. Blindenbach, Jung Hee Cheon
, Gamze Gürsoy
, Jiayi Kang
:
On the Overflow and p-adic Theory Applied to Homomorphic Encryption. 268-279 - Felipe Moreno Vera, Daniel Sadoc Menasché, Cabral Lima:
Beneath the Cream: Unveiling Relevant Information Points from CrimeBB with Its Ground Truth Labels. 280-290 - Rajnish Kumar
, Shlomi Arnon
:
Cybersecurity Enhancement for Wireless Networks Using Aerial Reconfigurable Intelligent Surfaces. 291-298 - Daniel Gilkarov, Lee-Ad Gottlieb, Hillel Ohayon:
KNN+X. 299-309 - Karim Eldefrawy, Ben Terner, Moti Yung:
Challenges in Timed-Cryptography: A Position Paper (Short Paper). 310-321 - Pawel Cyprys, Shlomi Dolev, Oded Margalit:
Post Quantum Lightweight OWF Candidates - Based on Theoretically Secure Primitives: Xors, Error Detection Codes, Permutations, Polynomials, Interaction, and Nesting (Short Version). 322-334 - Dina Barak-Pelleg
, Daniel Berend
, Aryeh Kontorovich
:
Super-Teaching in Machine Learning. 335-342 - George Teseleanu
:
A Lattice Attack Against a Family of RSA-Like Cryptosystems. 343-355 - Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Security Related Properties of Randomly Constructed Combinatorial Structures. 356-367 - Przemyslaw Kubiak
, Oliwer Sobolewski:
HBSS+: Simple Hash-Based Stateless Signatures Revisited - (Preliminary Version, Short Paper). 368-379
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.