262
Huang, Xinyi.
2014
Table of Contents:
“...Access Control in and Around the Browser -- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy...”2014
Full text
263
264
Padró, Carles.
2014
Table of Contents:
“... with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable...”2014
Full text
265
266
Benaloh, Josh.
2014
Table of Contents:
“... -- Automatic Search for Differential Trails in ARX Ciphers -- CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions -- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation -- Group Signatures with Message...”2014
Full text
267
Lindell, Yehuda.
2014
Table of Contents:
“...-Party Computation -- On the Cryptographic Complexity of the Worst Functions -- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol -- One-Sided Adaptively Secure Two-Party Computation -- Multi-linear Secret-Sharing...”2014
Full text
268
Table of Contents:
“...Cryptographic building blocks -- Mini tutorial -- Attacks and countermeasures -- Tools and methods -- Secure systems and applications....”
Full text
Full text
269
Schmidt, Kai-Uwe.
2014
Table of Contents:
“...Relationships Between CCZ and EA Equivalence Classes and Corresponding Code Invariants -- Boolean Functions -- Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions -- Properties of a Family of Cryptographic Boolean Functions -- A...”2014
Full text
270
271
Chen, Liqun.
2014
Table of Contents:
“...Security standardisation research, including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation.-Â Improving existing standards....”2014
Full text
272
273
274
Susilo, Willy.
2014
Table of Contents:
“...Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications....”2014
Full text
275
Yoshida, Maki.
2014
Table of Contents:
“... Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved...”2014
Full text
276
Aldini, Alessandro
2014
Table of Contents:
“... ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud...”2014
Full text
277
Prouff, Emmanuel.
2014
Table of Contents:
“... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...”2014
Full text
278
279
280
Lange, Tanja.
2014
Table of Contents:
“...)) in small characteristic -- High Precision Discrete Gaussian Sampling on FPGAs -- Discrete Ziggurat: A Time-Memory Trade-o for Sampling from a Gaussian Distribution over the Integers -- Elliptic Curves, Pairings and RSA A High-Speed Elliptic Curve Cryptographic...”2014
Full text