1
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I /
Table of Contents: ... -- From Substitution Box To Threshold -- Tight Security Bound of 2k-LightMAC Plus -- Designing Full-Rate Sponge based AEAD Modes -- Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Net- works -- The Patching Landscape of Elisabeth-4...

Full text 
2
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ..., and the Future -- Pay-as-you-go Data Integration: Experiences and Recurring Themes -- Foundations of Computer Science -- Robust Recoverable Path Using Backup Nodes -- On Contact Graphs with Cubes and Proportional Boxes -- Orthogonal Layout with Optimal Face Complexity...

Full text 
3
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post...

Full text 
4
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
5
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
6
Cryptography and Information Security in the Balkans [E-Book] : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers /
Table of Contents: ... -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations...

Full text 
7
Engineering Secure Software and Systems [E-Book] : 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings /
Table of Contents: ...: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a...

Full text 
8
Cryptography and Information Security in the Balkans [E-Book] : First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /
Table of Contents: ... Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer...

Full text 
9
Lightweight Cryptography for Security and Privacy [E-Book] : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /
Table of Contents: ...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...

Full text 
10
Advances in Information and Computer Security [E-Book] : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /
Table of Contents: ... -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against...

Full text 
11
Constructive Side-Channel Analysis and Secure Design [E-Book] : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /
Table of Contents: ... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...

Full text 
12
Information Security Theory and Practice. Securing the Internet of Things [E-Book] : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings /
Table of Contents: ... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box...

Full text 
13
Cryptographic Hardware and Embedded Systems – CHES 2014 [E-Book] : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings /
Table of Contents: ... with Randomization: A Countermeasure for AES against Differential Fault Attacks -- Reversing Stealthy Dopant-Level Circuits -- Constructing S-boxes for Lightweight Cryptography with Feistel Structure -- Countermeasures -- A Statistical Model for Higher Order DPA on Masked...

Full text 
14
Advances in Cryptology – ASIACRYPT 2014 [E-Book] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II /
Table of Contents: ... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....

Full text 
15
Advances in Cryptology – ASIACRYPT 2014 [E-Book] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I /
Table of Contents: ... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....

Full text 
16
Theory of Cryptography [E-Book] : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings /
Table of Contents: ...Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point...

Full text 
17
Progress in Cryptology – AFRICACRYPT 2014 [E-Book] : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /
Table of Contents: ... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...

Full text 
18
Selected Areas in Cryptography -- SAC 2013 [E-Book] : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers /
Table of Contents: ... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...

Full text 
19
Information Security and Privacy [E-Book] : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Table of Contents: ... Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its...

Full text 
20
Selected Areas in Cryptography [E-Book] : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers /
Table of Contents: ...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...

Full text