All Stories

  1. Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem
  2. Oblivious RAM (ORAM)
  3. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  4. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  5. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  6. Oblivious Parallel RAM (OPRAM)
  7. Oblivious RAM (ORAM)
  8. Locating Side Channel Leakage in Time through Matched Filters
  9. Shuffle Index
  10. Privacy-aware character pattern matching over outsourced encrypted data
  11. Integrating Side Channel Security in the FPGA Hardware Design Flow
  12. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  13. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  14. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  15. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  16. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  17. Efficient Oblivious Substring Search via Architectural Support
  18. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  19. Constant weight strings in constant time
  20. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  21. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  22. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  23. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  24. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  25. A Finite Regime Analysis of Information Set Decoding Algorithms
  26. A secure and authenticated host-to-memory communication interface
  27. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  28. Accelerating Automotive Analytics: The M2DC Appliance Approach
  29. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  30. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  31. Privacy preserving substring search protocol with polylogarithmic communication cost
  32. Systematic parsing of X.509: Eradicating security issues with a parse tree
  33. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  34. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  35. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  36. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  37. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  38. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  39. Three-Server Swapping for Access Confidentiality
  40. Enforcing authorizations while protecting access confidentiality1
  41. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  42. Side-channel security of superscalar CPUs
  43. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  44. Access Privacy in the Cloud
  45. The M2DC Approach towards Resource-efficient Computing
  46. A Novel Regular Format for X.509 Digital Certificates
  47. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  48. A Security Audit of the OpenPGP Format
  49. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  50. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  51. V2I Cooperation for Traffic Management with SafeCop
  52. The M2DC Project: Modular Microserver DataCentre
  53. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  54. Data centres for IoT applications: The M2DC approach (Invited paper)
  55. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  56. A Fault-Based Secret Key Retrieval Method for ECDSA
  57. Access Control for the Shuffle Index
  58. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  59. Encasing block ciphers to foil key recovery attempts via side channel
  60. Shuffle Index
  61. Cyber-security analysis and evaluation for smart home management solutions
  62. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  63. Information leakage chaff
  64. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  65. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  66. Trusted Computing for Embedded Systems
  67. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  68. Protecting Access Confidentiality with Data Distribution and Swapping
  69. Practical Cryptography
  70. Fault Sensitivity Analysis at Design Time
  71. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  72. Design space extension for secure implementation of block ciphers
  73. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  74. Security challenges in building automation and SCADA
  75. Securing software cryptographic primitives for embedded systems against side channel attacks
  76. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  77. Snake: An End-to-End Encrypted Online Social Network
  78. A multiple equivalent execution trace approach to secure cryptographic embedded software
  79. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  80. [Copyright notice]
  81. On Task Assignment in Data Intensive Scalable Computing
  82. On the Security of Partially Masked Software Implementations
  83. Differential Fault Analysis for Block Ciphers
  84. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  85. Supporting concurrency and multiple indexes in private access to outsourced data1
  86. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  87. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  88. Security Analysis of Building Automation Networks
  89. Distributed Shuffling for Preserving Access Confidentiality
  90. Secure and efficient design of software block cipher implementations on microcontrollers
  91. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  92. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  93. Theory and Practice of Cryptography Solutions for Secure Information Systems
  94. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  95. A code morphing methodology to automate power analysis countermeasures
  96. Injection Technologies for Fault Attacks on Microprocessors
  97. Smart metering in power grids: Application scenarios and security
  98. Security and Privacy in Smart Grid Infrastructures
  99. Efficient and Private Access to Outsourced Data
  100. Selective Exchange of Confidential Data in the Outsourcing Scenario
  101. Supporting Concurrency in Private Data Outsourcing
  102. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  103. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  104. Search over Encrypted Data
  105. Secure Audit Logs
  106. Secure Index
  107. Secure Logging
  108. Fault attack on AES with single-bit induced faults
  109. Low voltage fault attacks to AES
  110. Encryption-Based Policy Enforcement for Cloud Storage
  111. Record Setting Software Implementation of DES Using CUDA
  112. SMaC
  113. Countermeasures against fault attacks on software implemented AES
  114. Improving first order differential power attacks through digital signal processing
  115. Fast Disk Encryption through GPGPU Acceleration
  116. Low Voltage Fault Attacks on the RSA Cryptosystem
  117. A Transform-Parametric Approach to Boolean Matching
  118. Design of a parallel AES for graphics hardware using the CUDA framework
  119. A pairing SW implementation for Smart-Cards
  120. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  121. Preserving confidentiality of security policies in data outsourcing
  122. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  123. Countermeasures Against Branch Target Buffer Attacks
  124. Countermeasures Against Branch Target Buffer Attacks
  125. Program Organization
  126. A Unified Approach to Canonical Form-based Boolean Matching
  127. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  128. A unified approach to canonical form-based Boolean matching
  129. Computational intelligence techniques to detect toxic gas presence
  130. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  131. Software implementation of Tate pairing over GF(2/sup m/)
  132. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  133. Design Time Engineering of Side Channel Resistant Cipher Implementations