a |
Anonymous | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
attribute-based encryption | Registered Key-Policy Attribute-Based Encryption |
Autoencoder-Based Security | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
b |
Biometrics | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
BKW Algorithm | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |
block cipher | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
Blockchain | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
c |
Circular Transmission | Circular Quantum Secret Sharing Based on SWAP Gates |
code-based cryptography | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
commitment | A Generic Zero-Knowledge Range Argument with Preprocessing |
cross-domain authentication | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
Cryptanalysis | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
d |
data privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning |
DDH | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
designated tester | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
dynamic optimization | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
Dynamic Time Warping | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
e |
Execution Path Prediction | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
f |
Falcon | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
feature representation | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
Flexible Authorization | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
g |
gait authentication | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
GPV Framework | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
h |
Hamming metric QC codes | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
higher-order differential attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
Hybrid NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
i |
insert | Key-Value Commitments with Unlinkability |
Integral attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
k |
Key escrow problem | Registered Key-Policy Attribute-Based Encryption |
Key-Value Commitments | Key-Value Commitments with Unlinkability |
l |
lattice-based cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
Lightweight Real-Time Defense | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
local differential privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning |
m |
machine learning | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
n |
Nominative signatures | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
non-transferability | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
Number Theoretic Transform | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
o |
Oblivious Accumulators | Key-Value Commitments with Unlinkability |
p |
Phishing | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
Phishing Detection | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
phishing simulation | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
Piccolo | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
post-quantum cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
Post-quantum signature | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
Predicate Encoding | Registered Key-Policy Attribute-Based Encryption |
Privacy | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
Public key encryption with equality test | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
Public Key Encryption with Keyword Search | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
Python Implementation | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
q |
quantum secret sharing | Circular Quantum Secret Sharing Based on SWAP Gates |
r |
Registration-based encryption | Registered Key-Policy Attribute-Based Encryption |
Ring-LWE | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |
s |
Side-Channel Attack Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
signature | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
single photons | Circular Quantum Secret Sharing Based on SWAP Gates |
smart contract | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
SMOTE | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
Social Engineering | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
SOLMAE | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
standard model | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
SWAP gates | Circular Quantum Secret Sharing Based on SWAP Gates |
Symmetric Pairing | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
t |
Tight security | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
traffic log classification | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
Trojan-horse attacks | Circular Quantum Secret Sharing Based on SWAP Gates |
u |
unlinkability | Key-Value Commitments with Unlinkability |
Unsupervised Anomaly Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
update | Key-Value Commitments with Unlinkability |
URL | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
v |
Vehicle Fog Services | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
Virtual Reality | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
VOLE-based ZKP | A Generic Zero-Knowledge Range Argument with Preprocessing |
z |
Zero-knowledge range argument | A Generic Zero-Knowledge Range Argument with Preprocessing |