Human-Computer Interaction - Interact 2021: 18th Ifip Tc 13 International Conference, Bari, Italy, August 30 - September 3, 2021, Proceedings, Part IV » książka
Lattice-Based Cryptography A trace map attack against special ring-LWE samples.- Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem.- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.- Evidence Collection and Preservation System with Virtual Machine Monitoring.- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices.- FFT Program Generation for Ring LWE-based Cryptography.- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure.- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures.- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.- Simple Matrix Signature Scheme.- Game Theory and Security Moving Target Defense for the CloudControl Game.