All Stories

  1. Improving Quantum Compilation via Circuit Partitioning and Floorplanning
  2. Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes
  3. A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
  4. An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256
  5. Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace
  6. Embedded Computer Systems: Architectures, Modeling, and Simulation
  7. A Grover-Meets-Simon Approach to Match Vector Boolean Functions
  8. An Unprofiled Single Trace Side-Channel Attack for Asymmetric Cryptosystems
  9. Review of Policy-as-Code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems
  10. Availability, Reliability and Security
  11. Secure Audit Logs
  12. Secure Index
  13. Shuffle Index
  14. Top-k Query Processing on Encrypted Data
  15. Differentially Private ORAM
  16. Oblivious Parallel RAM (OPRAM)
  17. Oblivious RAM (ORAM)
  18. Privacy-Preserving Joins over Encrypted Data
  19. Private Boolean Queries on Encrypted Data
  20. Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-profiled Side Channel Attacks
  21. Solving the Subset Sum Problem via Quantum Walk Search
  22. A Quantum Method to Match Vector Boolean Functions using Simon's Solver
  23. Optimizing Quantum Circuit Synthesis with Dominator Analysis
  24. A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers
  25. Investigating the Health State of X.509 Digital Certificates
  26. Bit-Flipping Decoder Failure Rate Estimation for (v,w)-Regular Codes
  27. Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem
  28. A High Efficiency Hardware Design for the Post-Quantum KEM HQC
  29. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
  30. Differentially Private ORAM
  31. Privacy-Preserving Joins over Encrypted Data
  32. Top-k Query Processing on Encrypted Data
  33. A Versatile and Unified HQC Hardware Accelerator
  34. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
  35. Fault Attacks Friendliness of Post-quantum Cryptosystems
  36. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
  37. Oblivious RAM (ORAM)
  38. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  39. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  40. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  41. Oblivious Parallel RAM (OPRAM)
  42. Oblivious RAM (ORAM)
  43. Private Boolean Queries on Encrypted Data
  44. Secure Audit Logs
  45. Secure Index
  46. Quantum Computing Research Lines in the Italian Center for Supercomputing
  47. Locating Side Channel Leakage in Time through Matched Filters
  48. Profiled side channel attacks against the RSA cryptosystem using neural networks
  49. Shuffle Index
  50. Performance Bounds for QC-MDPC Codes Decoders
  51. A Complete Quantum Circuit to Solve the Information Set Decoding Problem
  52. Privacy-aware character pattern matching over outsourced encrypted data
  53. Integrating Side Channel Security in the FPGA Hardware Design Flow
  54. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  55. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  56. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  57. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  58. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  59. Efficient Oblivious Substring Search via Architectural Support
  60. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  61. Constant weight strings in constant time
  62. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  63. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  64. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  65. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  66. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  67. A Finite Regime Analysis of Information Set Decoding Algorithms
  68. A secure and authenticated host-to-memory communication interface
  69. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  70. Accelerating Automotive Analytics: The M2DC Appliance Approach
  71. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  72. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  73. Privacy preserving substring search protocol with polylogarithmic communication cost
  74. Systematic parsing of X.509: Eradicating security issues with a parse tree
  75. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  76. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  77. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  78. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  79. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  80. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  81. Three-Server Swapping for Access Confidentiality
  82. Enforcing authorizations while protecting access confidentiality1
  83. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  84. Side-channel security of superscalar CPUs
  85. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  86. Access Privacy in the Cloud
  87. The M2DC Approach towards Resource-efficient Computing
  88. A Novel Regular Format for X.509 Digital Certificates
  89. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  90. A Security Audit of the OpenPGP Format
  91. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  92. Encasing block ciphers to foil key recovery attempts via side channel
  93. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  94. V2I Cooperation for Traffic Management with SafeCop
  95. The M2DC Project: Modular Microserver DataCentre
  96. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  97. Data centres for IoT applications: The M2DC approach (Invited paper)
  98. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  99. A Fault-Based Secret Key Retrieval Method for ECDSA
  100. Access Control for the Shuffle Index
  101. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  102. Shuffle Index
  103. Foreword:
  104. Cyber-security analysis and evaluation for smart home management solutions
  105. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  106. Information leakage chaff
  107. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  108. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  109. Trusted Computing for Embedded Systems
  110. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  111. Protecting Access Confidentiality with Data Distribution and Swapping
  112. Practical Cryptography
  113. Fault Sensitivity Analysis at Design Time
  114. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  115. Design space extension for secure implementation of block ciphers
  116. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  117. Security challenges in building automation and SCADA
  118. Securing software cryptographic primitives for embedded systems against side channel attacks
  119. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  120. Snake: An End-to-End Encrypted Online Social Network
  121. A multiple equivalent execution trace approach to secure cryptographic embedded software
  122. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  123. [Copyright notice]
  124. On Task Assignment in Data Intensive Scalable Computing
  125. On the Security of Partially Masked Software Implementations
  126. Differential Fault Analysis for Block Ciphers
  127. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  128. Preface
  129. Supporting concurrency and multiple indexes in private access to outsourced data1
  130. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  131. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  132. Security Analysis of Building Automation Networks
  133. Distributed Shuffling for Preserving Access Confidentiality
  134. Secure and efficient design of software block cipher implementations on microcontrollers
  135. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  136. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  137. Theory and Practice of Cryptography Solutions for Secure Information Systems
  138. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  139. A code morphing methodology to automate power analysis countermeasures
  140. Injection Technologies for Fault Attacks on Microprocessors
  141. Smart metering in power grids: Application scenarios and security
  142. Security and Privacy in Smart Grid Infrastructures
  143. Efficient and Private Access to Outsourced Data
  144. Selective Exchange of Confidential Data in the Outsourcing Scenario
  145. Supporting Concurrency in Private Data Outsourcing
  146. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  147. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  148. Search over Encrypted Data
  149. Secure Audit Logs
  150. Secure Index
  151. Secure Logging
  152. Fault attack on AES with single-bit induced faults
  153. Low voltage fault attacks to AES
  154. Encryption-Based Policy Enforcement for Cloud Storage
  155. Record Setting Software Implementation of DES Using CUDA
  156. SMaC
  157. Countermeasures against fault attacks on software implemented AES
  158. Improving first order differential power attacks through digital signal processing
  159. Fast Disk Encryption through GPGPU Acceleration
  160. Low Voltage Fault Attacks on the RSA Cryptosystem
  161. A Transform-Parametric Approach to Boolean Matching
  162. Design of a parallel AES for graphics hardware using the CUDA framework
  163. A pairing SW implementation for Smart-Cards
  164. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  165. Preserving confidentiality of security policies in data outsourcing
  166. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  167. Countermeasures Against Branch Target Buffer Attacks
  168. Countermeasures Against Branch Target Buffer Attacks
  169. Program Organization
  170. A Unified Approach to Canonical Form-based Boolean Matching
  171. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  172. A unified approach to canonical form-based Boolean matching
  173. Computational intelligence techniques to detect toxic gas presence
  174. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  175. Software implementation of Tate pairing over GF(2/sup m/)
  176. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  177. The Role of the Normal Phonon–Phonon Scattering in the Lattice Thermal Conductivity and Phonon Drag in Metals at Low Temperatures
  178. The lattice thermal conductivity of aluminium at low temperatures
  179. Magnetic susceptibility of the singlet ground-state system (LaPr)Sn3
  180. Design Time Engineering of Side Channel Resistant Cipher Implementations