首页 > 最新文献

Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

英文 中文
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun 检查交替模式:月球或太阳的物理零知识证明
Samuel Hand, Alexander Koch, P. Lafourcade, Daiki Miyahara, Léo Robert
{"title":"Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun","authors":"Samuel Hand, Alexander Koch, P. Lafourcade, Daiki Miyahara, Léo Robert","doi":"10.1007/978-3-031-41326-1_14","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"54 1","pages":"1560"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84137876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials 基于一组置换多项式的公钥密码系统的全破
M. Cartor, Ryann Cartor, M. Lewis, Daniel Smith-Tone
{"title":"Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials","authors":"M. Cartor, Ryann Cartor, M. Lewis, Daniel Smith-Tone","doi":"10.1007/978-3-031-41326-1_8","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_8","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"9 1","pages":"137-151"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78054445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Boomerang Attacks on Deoxys-BC 增强对Deoxys-BC的回旋镖攻击
Jiahao Zhao, N. Zhang, Qianqian Yang, Ling Song, Lei Hu
{"title":"Improved Boomerang Attacks on Deoxys-BC","authors":"Jiahao Zhao, N. Zhang, Qianqian Yang, Ling Song, Lei Hu","doi":"10.1007/978-3-031-41326-1_4","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"77 1","pages":"59-76"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85144168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup 无可信设置的次对数证明和次线性验证器内积参数
H. Lee, Jae Hong Seo
{"title":"TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup","authors":"H. Lee, Jae Hong Seo","doi":"10.1007/978-3-031-41326-1_12","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":"214-234"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88711321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 好的、坏的和二值化:一种基于lstm的固件分析中截面边界检测方法
Riccardo Remigio, A. Bertani, Mario Polino, Michele Carminati, S. Zanero
{"title":"The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis","authors":"Riccardo Remigio, A. Bertani, Mario Polino, Michele Carminati, S. Zanero","doi":"10.1007/978-3-031-41326-1_2","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_2","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"36 1","pages":"16-35"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91120782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors 基于错误分割法的改进混合攻击求五叉短点阵向量
Haiming Zhu, Shoichi Kamada, Momonari Kudo, T. Takagi
{"title":"Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors","authors":"Haiming Zhu, Shoichi Kamada, Momonari Kudo, T. Takagi","doi":"10.1007/978-3-031-41326-1_7","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"43 1","pages":"117-136"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79544092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability of Ring Oscillator PUFs with Reduced Helper Data 减少辅助数据的环形振荡器puf的可靠性
Julien Béguinot, Wei Cheng, J. Danger, S. Guilley, O. Rioul, Ville Yli-Mäyry
{"title":"Reliability of Ring Oscillator PUFs with Reduced Helper Data","authors":"Julien Béguinot, Wei Cheng, J. Danger, S. Guilley, O. Rioul, Ville Yli-Mäyry","doi":"10.1007/978-3-031-41326-1_3","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"30 1","pages":"36-56"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85479394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack 基于矩形MinRank攻击的新型MAYO和QR-UOV安全分析
Hiroki Furue, Yasuhiko Ikematsu
{"title":"A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack","authors":"Hiroki Furue, Yasuhiko Ikematsu","doi":"10.1007/978-3-031-41326-1_6","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"26 1","pages":"101-116"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90082370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security PMACrx:一种具有BBB安全性的高维向量向量输入MAC
Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata
{"title":"PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security","authors":"Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata","doi":"10.1007/978-3-031-41326-1_5","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_5","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1997 1","pages":"77-97"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88178173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges 功率分析走得太远:用燃料计打破基于android的隔离
Vincent Giraud, David Naccache
{"title":"Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges","authors":"Vincent Giraud, David Naccache","doi":"10.1007/978-3-031-41326-1_1","DOIUrl":"https://doi.org/10.1007/978-3-031-41326-1_1","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"42 1","pages":"3-15"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77287993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1