SECITC 2022: 15TH INTERNATIONAL CONFERENCE ON SECURITY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
analysis
analytics
Anonymization
Attribute-based encryption
attribute-hiding
Authenticated Encryption
authentication
B
BDH 3 assumption
beautiful security
block cipher
C
Card-based cryptography
Cryptographic Permutations
Cube attack
cybersecurity
D
detection
differential cryptanalysis
Distributed Key Generation
Division property
E
Efficient Cryptography
encryption
Encryption schemes
F
flaws
formal methods
FUTURE
G
Grain-128AEAD
Group Theory
H
Homomorphic encryption
Hyperspectral camera
I
IND-CPA security
Industrial Enterprise
Information Security
Inner product functional encryption
Internet of Things
invisible security
L
Lightweight cipher
Lightweight Cryptography
linear cryptanalysis
M
machine learning
MILP
model protection
MSP430 Architecture
Multiparty Computation
N
network security
neural networks with quantized parameters
NIST standardization process
non-monotone
Non-monotone access structure
P
Pancake sorting
Performance Evaluation
permutation
Physical assumption
physically unclonable function
privacy
Q
quasigroups
R
random oracle model
Reference Architecture
Revocation
RSA Exponentiations
S
secure computation
Secure Delegation
security
side channel analysis
Social network
socio-technical system
Software Optimization
software security
source code vulnerability
Statistical Security
Statistical tests
substitution permutation networks
systems
T
Task Oriented Privacy
ternary neural networks
Three-subset division property
Threshold Paillier Cryptography
traffic classification
U
unbounded
Unboundedness
user activity
V
vulnerabilities
vulnerability scanners
Z
Zero-knowledge proof