LEADER 05590nam 22007215 450 001 996538666003316 005 20230531085544.0 010 $a3-031-34671-8 024 7 $a10.1007/978-3-031-34671-2 035 $a(CKB)27113409800041 035 $a(MiAaPQ)EBC30604241 035 $a(Au-PeEL)EBL30604241 035 $a(DE-He213)978-3-031-34671-2 035 $a(PPN)272259489 035 $a(EXLCZ)9927113409800041 100 $a20230531d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security, Cryptology, and Machine Learning$b[electronic resource] $e7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29?30, 2023, Proceedings /$fedited by Shlomi Dolev, Ehud Gudes, Pascal Paillier 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (539 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13914 311 $a9783031346705 327 $aLocalhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages. 330 $aThis book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023. The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13914 606 $aData protection 606 $aApplication software 606 $aComputer networks 606 $aMachine learning 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aMachine Learning 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aMachine learning. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aMachine Learning. 615 24$aCryptology. 676 $a005.8 700 $aDolev$b Shlomi$01369733 701 $aGudes$b Ehud$01369734 701 $aPaillier$b Pascal$01369735 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996538666003316 996 $aCyber Security, Cryptology, and Machine Learning$93396456 997 $aUNISA LEADER 06728nam 2201429 a 450 001 9910789730903321 005 20210519213339.0 010 $a1-283-37996-1 010 $a9786613379962 010 $a1-4008-4270-0 024 7 $a10.1515/9781400842704 035 $a(CKB)2670000000133403 035 $a(EBL)827807 035 $a(OCoLC)769343171 035 $a(SSID)ssj0000575757 035 $a(PQKBManifestationID)11408626 035 $a(PQKBTitleCode)TC0000575757 035 $a(PQKBWorkID)10553428 035 $a(PQKB)10618809 035 $a(MiAaPQ)EBC827807 035 $a(StDuBDS)EDZ0000406946 035 $a(DE-B1597)447783 035 $a(OCoLC)979905293 035 $a(DE-B1597)9781400842704 035 $a(Au-PeEL)EBL827807 035 $a(CaPaEBR)ebr10521872 035 $a(CaONFJC)MIL337996 035 $z(PPN)199244731 035 $a(PPN)187959633 035 $a(EXLCZ)992670000000133403 100 $a20110826d2012 uy 0 101 0 $aeng 135 $aurun#---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aConvolution and equidistribution$b[electronic resource] $eSato-Tate theorems for finite-field Mellin transforms /$fNicholas M. Katz 205 $aCourse Book 210 $aPrinceton ;$aOxford $cPrinceton University Press$dc2012 215 $a1 online resource (213 p.) 225 1 $aAnnals of mathematics studies ;$vno. 180 300 $aDescription based upon print version of record. 311 0 $a0-691-15330-2 311 0 $a0-691-15331-0 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tIntroduction --$tCHAPTER 1. Overview --$tCHAPTER 2. Convolution of Perverse Sheaves --$tCHAPTER 3. Fibre Functors --$tCHAPTER 4. The Situation over a Finite Field --$tCHAPTER 5. Frobenius Conjugacy Classes --$tCHAPTER 6. Group-Theoretic Facts about Ggeom and Garith --$tCHAPTER 7. The Main Theorem --$tCHAPTER 8. Isogenies, Connectedness, and Lie-Irreducibility --$tCHAPTER 9. Autodualities and Signs --$tCHAPTER 10. A First Construction of Autodual Objects --$tCHAPTER 11. A Second Construction of Autodual Objects --$tCHAPTER 12. The Previous Construction in the Nonsplit Case --$tCHAPTER 13. Results of Goursat-Kolchin-Ribet Type --$tCHAPTER 14. The Case of SL(2); the Examples of Evans and Rudnick --$tCHAPTER 15. Further SL(2) Examples, Based on the Legendre Family --$tCHAPTER 16. Frobenius Tori and Weights; Getting Elements of Garith --$tCHAPTER 17. GL(n) Examples --$tCHAPTER 18. Symplectic Examples --$tCHAPTER 19. Orthogonal Examples, Especially SO(n) Examples --$tCHAPTER 20. GL(n) x GL(n) x ... x GL(n) Examples --$tCHAPTER 21. SL(n) Examples, for n an Odd Prime --$tCHAPTER 22. SL(n) Examples with Slightly Composite n --$tCHAPTER 23. Other SL(n) Examples --$tCHAPTER 24. An O(2n) Example --$tCHAPTER 25. G2 Examples: the Overall Strategy --$tCHAPTER 26. G2 Examples: Construction in Characteristic Two --$tCHAPTER 27. G2 Examples: Construction in Odd Characteristic --$tCHAPTER 28. The Situation over ?: Results --$tCHAPTER 29. The Situation over ?: Questions --$tCHAPTER 30. Appendix: Deligne's Fibre Functor --$tBibliography --$tIndex 330 $aConvolution and Equidistribution explores an important aspect of number theory--the theory of exponential sums over finite fields and their Mellin transforms--from a new, categorical point of view. The book presents fundamentally important results and a plethora of examples, opening up new directions in the subject. The finite-field Mellin transform (of a function on the multiplicative group of a finite field) is defined by summing that function against variable multiplicative characters. The basic question considered in the book is how the values of the Mellin transform are distributed (in a probabilistic sense), in cases where the input function is suitably algebro-geometric. This question is answered by the book's main theorem, using a mixture of geometric, categorical, and group-theoretic methods. By providing a new framework for studying Mellin transforms over finite fields, this book opens up a new way for researchers to further explore the subject. 410 0$aAnnals of mathematics studies ;$vno. 180. 606 $aMellin transform 606 $aConvolutions (Mathematics) 606 $aSequences (Mathematics) 610 $aArtin?chreier reduced polynomial. 610 $aEmanuel Kowalski. 610 $aEuler?oincar formula. 610 $aFrobenius conjugacy class. 610 $aFrobenius conjugacy. 610 $aFrobenius tori. 610 $aGoursat?olchin?ibet theorem. 610 $aKloosterman sheaf. 610 $aLaurent polynomial. 610 $aLegendre. 610 $aMellin transform. 610 $aPierre Deligne. 610 $aRon Evans. 610 $aTannakian category. 610 $aTannakian groups. 610 $aZeeev Rudnick. 610 $aalgebro-geometric. 610 $aautodual objects. 610 $aautoduality. 610 $acharacteristic two. 610 $aconnectedness. 610 $adimensional objects. 610 $aduality. 610 $aequidistribution. 610 $aexponential sums. 610 $afiber functor. 610 $afinite field Mellin transform. 610 $afinite field. 610 $afinite fields. 610 $ageometrical irreducibility. 610 $agroup scheme. 610 $ahypergeometric sheaf. 610 $ainterger monic polynomials. 610 $aisogenies. 610 $alie-irreducibility. 610 $alisse. 610 $amiddle convolution. 610 $amiddle extension sheaf. 610 $amonic polynomial. 610 $amonodromy groups. 610 $anoetherian connected scheme. 610 $anonsplit form. 610 $anontrivial additive character. 610 $anumber theory. 610 $aodd characteristic. 610 $aodd prime. 610 $aorthogonal case. 610 $aperverse sheaves. 610 $apolynomials. 610 $apure weight. 610 $asemisimple object. 610 $asemisimple. 610 $asheaves. 610 $asigns. 610 $asplit form. 610 $asupermorse. 610 $atheorem. 610 $atheorems. 615 0$aMellin transform. 615 0$aConvolutions (Mathematics) 615 0$aSequences (Mathematics) 676 $a515/.723 686 $aSI 830$2rvk 700 $aKatz$b Nicholas M.$f1943-$059374 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910789730903321 996 $aConvolution and equidistribution$9854265 997 $aUNINA