default search action
5th SPACE 2015: Jaipur, India
- Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth:
Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. Lecture Notes in Computer Science 9354, Springer 2015, ISBN 978-3-319-24125-8 - Sanjit Chatterjee, Sayantan Mukherjee, Govind Patidar:
Efficient Protocol for Authenticated Email Search. 1-20 - Vit Bukac, Vashek Matyas:
Analyzing Traffic Features of Common Standalone DoS Attack Tools. 21-40 - Avik Dayal, Yi Deng, Sandeep K. Shukla:
Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach. 41-54 - Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. 55-74 - Leo St. Amour, W. Michael Petullo:
Improving Application Security through TLS-Library Redesign. 75-94 - Subhadeep Banik, Sonu Jha:
How Not to Combine RC4 States. 95-112 - Riham AlTawy, Amr M. Youssef:
Preimage Analysis of the Maelstrom-0 Hash Function. 113-126 - Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Meet-in-the-Middle Attacks on Round-Reduced Khudra. 127-138 - Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. 139-150 - Claude Carlet:
S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels. 151-171 - Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani:
Simulations of Optical Emissions for Attacking AES and Masked AES. 172-189 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. 190-209 - Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:
Modified Transparency Order Property: Solution or Just Another Attempt. 210-227 - Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen:
Investigating SRAM PUFs in large CPUs and GPUs. 228-247 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. 248-268 - Dan Cvrcek, Petr Svenda:
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service. 269-288 - Erick Nascimento, Julio López, Ricardo Dahab:
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers. 289-309 - Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs:
Towards Practical Attribute-Based Signatures. 310-328 - Lukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski:
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. 329-346 - Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini:
Compact Accumulator Using Lattices. 347-358 - Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini:
Almost Optimum Secret Sharing with Cheating Detection. 359-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.