default search action
22nd SAC 2015: Sackville, NB, Canada
- Orr Dunkelman, Liam Keliher:
Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9566, Springer 2016, ISBN 978-3-319-31300-9
Privacy Enhancing Technologies
- Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:
Formal Treatment of Privacy-Enhancing Credential Systems. 3-24 - Marie Paindavoine, Bastien Vialla:
Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption. 25-43 - Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana:
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks. 44-64
Cryptanalysis of Symmetric-Key Primitives
- Muhammed F. Esgin, Orhun Kara:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 67-85 - Anne Canteaut, Virginie Lallemand, María Naya-Plasencia:
Related-Key Attack on Full-Round PICARO. 86-101 - Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. 102-121 - Li Lin, Wenling Wu, Yafei Zheng:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 122-142
Implementation of Cryptographic Schemes
- Tung Chou:
Sandy2x: New Curve25519 Speed Records. 145-160 - Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p). 161-177 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. 178-194
Short Papers
- Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel:
Forgery and Subkey Recovery on CAESAR Candidate iFeed. 197-204 - Chrysanthi Mavromati:
Key-Recovery Attacks Against the MAC Algorithm Chaskey. 205-216 - Gaëtan Leurent:
Differential Forgery Attack Against LAC. 217-224
Privacy Preserving Data Processing
- Thomas Vannet, Noboru Kunihiro:
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem. 227-240 - Attila Altay Yavuz, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 241-259
Side Channel Attacks and Defenses
- Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and Its Application to Tightening Threshold Implementations. 263-276 - Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. 277-292 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. 293-309 - Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. 310-327
New Cryptographic Constructions
- Kassem Kalach, Reihaneh Safavi-Naini:
An Efficient Post-Quantum One-Time Signature Scheme. 331-351 - Zhiyuan Guo, Wenling Wu, Si Gao:
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure. 352-372 - Anne Canteaut, Sébastien Duval, Gaëtan Leurent:
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures. 373-393
Authenticated Encryption
- Yu Sasaki, Kan Yasuda:
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data. 397-416 - Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. 417-438
On the Hardness of Mathematical Problems
- Mingqiang Wang, Tao Zhan, Haibin Zhang:
Bit Security of the CDH Problems over Finite Fields. 441-461 - Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:
Towards Optimal Bounds for Implicit Factorization Problem. 462-476
Cryptanalysis of Authenticated Encryption Schemes
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on Round-Reduced ICEPOLE-128. 479-492 - Jérémy Jean, Yu Sasaki, Lei Wang:
Analysis of the CAESAR Candidate Silver. 493-509 - Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. 510-526
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.