1
Bhasin, Shivam
2024
Table of Contents:
“... -- From Substitution Box To Threshold -- Tight Security Bound of 2k-LightMAC Plus -- Designing Full-Rate Sponge based AEAD Modes -- Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Net- works -- The Patching Landscape of Elisabeth-4...”2024
Full text
2
Catania, Barbara
2016
Table of Contents:
“..., and the Future -- Pay-as-you-go Data Integration: Experiences and Recurring Themes -- Foundations of Computer Science -- Robust Recoverable Path Using Backup Nodes -- On Contact Graphs with Cubes and Proportional Boxes -- Orthogonal Layout with Optimal Face Complexity...”2016
Full text
3
Hirt, Martin
2016
Table of Contents:
“... Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post...”2016
Full text
4
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
5
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
6
Knudsen, Lars R
2016
Table of Contents:
“... -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations...”2016
Full text
7
Table of Contents:
“...: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a...”
Full text
Full text
8
Ors, Berna.
2015
Table of Contents:
“... Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer...”2015
Full text
9
Eisenbarth, Thomas.
2015
Table of Contents:
“...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...”2015
Full text
10
Yoshida, Maki.
2014
Table of Contents:
“... -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against...”2014
Full text
11
Prouff, Emmanuel.
2014
Table of Contents:
“... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...”2014
Full text
12
Naccache, David.
2014
Table of Contents:
“... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box...”2014
Full text
13
Batina, Lejla.
2014
Table of Contents:
“... with Randomization: A Countermeasure for AES against Differential Fault Attacks -- Reversing Stealthy Dopant-Level Circuits -- Constructing S-boxes for Lightweight Cryptography with Feistel Structure -- Countermeasures -- A Statistical Model for Higher Order DPA on Masked...”2014
Full text
14
Sarkar, Palash.
2014
Table of Contents:
“... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....”2014
Full text
15
Sarkar, Palash.
2014
Table of Contents:
“... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....”2014
Full text
16
Lindell, Yehuda.
2014
Table of Contents:
“...Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point...”2014
Full text
17
Pointcheval, David.
2014
Table of Contents:
“... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...”2014
Full text
18
Lange, Tanja.
2014
Table of Contents:
“... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...”2014
Full text
19
Boyd, Colin.
2013
Table of Contents:
“... Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its...”2013
Full text
20
Knudsen, Lars R.
2013
Table of Contents:
“...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...”2013
Full text