Zobrazeno 1 - 10
of 8 555
pro vyhledávání: '"[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]"'
Autor:
Rocco Mora, Jean-Pierre Tillich
Publikováno v:
Designs, Codes and Cryptography
Designs, Codes and Cryptography, 2022, ⟨10.1007/s10623-022-01153-w⟩
Designs, Codes and Cryptography, 2022, ⟨10.1007/s10623-022-01153-w⟩
International audience; The Goppa Code Distinguishing (GD) problem asks to distinguish efficiently a generator matrix of a Goppa code from a randomly drawn one. We revisit a distinguisher for alternant and Goppa codes through a new approach, namely b
Autor:
El Housni, Youssef
Publikováno v:
ACNS2023-21st International Conference on Applied Cryptography and Network Security
ACNS2023-21st International Conference on Applied Cryptography and Network Security, Jun 2023, Kyoto, Japan
ACNS2023-21st International Conference on Applied Cryptography and Network Security, Jun 2023, Kyoto, Japan
International audience; Bilinear pairings have been used in different cryptographic applications and demonstrated to be a key building block for a plethora of constructions. In particular, some Succinct Non-interactive ARguments of Knowledge (SNARKs)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5c5ad0fa19558c20ad8962259bc1c9d9
https://hal.science/hal-03777499
https://hal.science/hal-03777499
Publikováno v:
28ème conférence de l’AIM
28ème conférence de l’AIM, Association Information et Management, May 2023, Dijon, France
28ème conférence de l’AIM, Association Information et Management, May 2023, Dijon, France
The law n°2022-309 for the implementation of a cybersecurity certification of digital platforms, which came into force on October 1st, 2022, is intended for the general public so that users can become aware of cyber risks when they use digital servi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::353e7f05913bfddf0b3a5878f4124d66
https://hal.science/hal-04114882
https://hal.science/hal-04114882
Publikováno v:
SP 2023-44th IEEE Symposium on Security and Privacy
SP 2023-44th IEEE Symposium on Security and Privacy, May 2023, San Francisco, United States
SP 2023-44th IEEE Symposium on Security and Privacy, May 2023, San Francisco, United States
International audience; Several targeted advertising platforms offer transparency mechanisms, but researchers and civil societies repeatedly showed that those have major limitations. In this paper, we propose a collaborative ad transparency method to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2dff999e6cc81e23fb6002537f46de40
https://inria.hal.science/hal-03916393
https://inria.hal.science/hal-03916393
Autor:
Poisson, Manuel, Viet Triem Tong, Valérie, Guette, Gilles, Abgrall, Erwan, Guihéry, Frédéric, Crémilleux, Damien
Publikováno v:
2023 7th Cyber Security in Networking Conference (CSNet)
CSNet 2023-7th Cyber Security in Networking Conference
CSNet 2023-7th Cyber Security in Networking Conference, IEEE ComSoc, Oct 2023, Montreal, Canada. pp.1-7
CSNet 2023-7th Cyber Security in Networking Conference
CSNet 2023-7th Cyber Security in Networking Conference, IEEE ComSoc, Oct 2023, Montreal, Canada. pp.1-7
International audience; When an attacker targets a system, he aims to remain undetected as long as possible. He must therefore avoid performing actions that are characteristic of an identified malicious behavior. One way to avoid detection is to only
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2755::adef0ade0047d7b16c6f7330eeb7feef
https://inria.hal.science/hal-04163780/file/paper_csnet.pdf
https://inria.hal.science/hal-04163780/file/paper_csnet.pdf
Publikováno v:
The 18th International Conference on Availability, Reliability and Security (ARES 2023)
The 18th International Conference on Availability, Reliability and Security (ARES 2023), Aug 2023, Benevento, Italy. ⟨10.1145/3600160.3605068⟩
The 18th International Conference on Availability, Reliability and Security (ARES 2023), Aug 2023, Benevento, Italy. ⟨10.1145/3600160.3605068⟩
International audience; Industrial Control Systems (ICS) are specific systems that combine information technology (IT) and operational technology (OT). Due to their interconnection and remote accessibility, they become a target for cyberattacks. As a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3515::c10db75cae6d186bb777893cd6a4fc8f
https://hal.science/hal-04165419/document
https://hal.science/hal-04165419/document
Publikováno v:
DEXA 2023-34th International Conference on Database and Expert Systems Applications
DEXA 2023-34th International Conference on Database and Expert Systems Applications, Aug 2023, Penang, Malaysia
DEXA 2023-34th International Conference on Database and Expert Systems Applications, Aug 2023, Penang, Malaysia
International audience; Federated knowledge discovery and data mining are challenged to assess the trustworthiness of data originating from autonomous sources while protecting confidentiality and privacy. Truth-finding algorithms help corroborate dat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::3ebcc2172ad26eb5dd84ec034721821f
https://inria.hal.science/hal-04139281/file/main.pdf
https://inria.hal.science/hal-04139281/file/main.pdf
Publikováno v:
USENIX Security '23-32nd USENIX Security Symposium
USENIX Security '23-32nd USENIX Security Symposium, Aug 2023, Anaheim, CA, United States
USENIX Security '23-32nd USENIX Security Symposium, Aug 2023, Anaheim, CA, United States
International audience; EDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange (LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for constrained IoT communication technologies. In this pape
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::b29ed6310740bb58ecbf4778b9357503
https://inria.hal.science/hal-03810102
https://inria.hal.science/hal-03810102
Publikováno v:
Journal of Computer Security
Journal of Computer Security, 2022, pp.1-27. ⟨10.3233/JCS-210051⟩
Journal of Computer Security, 2022, pp.1-27. ⟨10.3233/JCS-210051⟩
International audience; We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks d
Autor:
Jan Butora, Patrick Bas
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
Side-informed steganography has always been among the most secure approaches in the field. However, a majority of existing methods for JPEG images use the side information, here the rounding error, in a heuristic way. For the first time, we show that