Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok. (arXiv:2301.11600v1 [cs.SI])
TikTok has been criticized for its low privacy standards, but little is known about how its adolescent users protect their privacy. Based on interviews with 54 adolescents in Switzerland, this…
Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64. (arXiv:2301.11601v1 [cs.CR])
In CRYPTO 2019, Gohr presented differential-neural cryptanalysis by building the differential distinguisher with a neural network, achieving practical 11-, and 12-round key recovery attack for Speck32/64. Inspired by this framework,…
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. (arXiv:2301.11730v1 [cs.IT])
Private Information Retrieval (PIR) schemes allow a client to retrieve any file of interest, while hiding the file identity from the database servers. In contrast to most existing PIR schemes…
Side Auth: Synthesizing Virtual Sensors for Authentication. (arXiv:2301.11745v1 [cs.CR])
While the embedded security research community aims to protect systems by reducing analog sensor side channels, our work argues that sensor side channels can be beneficial to defenders. This work…
Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64. (arXiv:2301.11601v1 [cs.CR])
In CRYPTO 2019, Gohr presented differential-neural cryptanalysis by building the differential distinguisher with a neural network, achieving practical 11-, and 12-round key recovery attack for Speck32/64. Inspired by this framework,…
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok. (arXiv:2301.11600v1 [cs.SI])
TikTok has been criticized for its low privacy standards, but little is known about how its adolescent users protect their privacy. Based on interviews with 54 adolescents in Switzerland, this…
Side Auth: Synthesizing Virtual Sensors for Authentication. (arXiv:2301.11745v1 [cs.CR])
While the embedded security research community aims to protect systems by reducing analog sensor side channels, our work argues that sensor side channels can be beneficial to defenders. This work…
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. (arXiv:2301.11730v1 [cs.IT])
Private Information Retrieval (PIR) schemes allow a client to retrieve any file of interest, while hiding the file identity from the database servers. In contrast to most existing PIR schemes…
Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64. (arXiv:2301.11601v1 [cs.CR])
In CRYPTO 2019, Gohr presented differential-neural cryptanalysis by building the differential distinguisher with a neural network, achieving practical 11-, and 12-round key recovery attack for Speck32/64. Inspired by this framework,…
Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64. (arXiv:2301.11601v1 [cs.CR])
In CRYPTO 2019, Gohr presented differential-neural cryptanalysis by building the differential distinguisher with a neural network, achieving practical 11-, and 12-round key recovery attack for Speck32/64. Inspired by this framework,…