
Sign up to save your podcasts
Or


Cybersecurity of Quantum Key Distribution Implementations
Millions of inequivalent quadratic APN functions in eight variables
4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four
Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing
Attack Pattern Mining to Discover Hidden Threats to Industrial Control
Privacy Risk Predictions Based on Fundamental Understanding of Personal
Bases of Riemann-Roch spaces associated with arbitrary elliptic curve
Per-element Secure Aggregation against Data Reconstruction Attacks in
Prompt Injection Vulnerability of Consensus Generating Applications in
SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in
DP-DocLDM: Differentially Private Document Image Generation using Latent
Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time
Secure Development of a Hooking-Based Deception Framework Against
Evaluating Selective Encryption Against Gradient Inversion Attacks
SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for
Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
Identity Theft in AI Conference Peer Review
Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability
Reputation-based partition scheme for IoT security
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCybersecurity of Quantum Key Distribution Implementations
Millions of inequivalent quadratic APN functions in eight variables
4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four
Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing
Attack Pattern Mining to Discover Hidden Threats to Industrial Control
Privacy Risk Predictions Based on Fundamental Understanding of Personal
Bases of Riemann-Roch spaces associated with arbitrary elliptic curve
Per-element Secure Aggregation against Data Reconstruction Attacks in
Prompt Injection Vulnerability of Consensus Generating Applications in
SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in
DP-DocLDM: Differentially Private Document Image Generation using Latent
Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time
Secure Development of a Hooking-Based Deception Framework Against
Evaluating Selective Encryption Against Gradient Inversion Attacks
SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for
Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
Identity Theft in AI Conference Peer Review
Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability
Reputation-based partition scheme for IoT security
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>