Linked e-resources
Details
Table of Contents
[I]. Side-channel analysis: 1. Virtual security evaluation : an operational methodology for side-channel leakage detection at source-code level / Youssef Souissi, Adrien Facon, Sylvain Guilley
2. Cache-timing attacks still threaten IoT devices / Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain GUilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu
3. Speed-up of SCA attacks on 32-bit multiplications / Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad.
[II]. Cryptography: 4. Arabic cryptography and steganography in Morocco / Abdelmalek Azizi
5. An AEAD variant of the grain stream cipher / Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida
6. Construction for a nominative signature scheme from lattice with enhanced security / Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
7. Reinterpreting and improving the cryptanalysis of the Flash Player PRNG / George Teşeleanu
8. A key exchange based on the short integer solution problem and the learning with errors problem / Jintai Ding, Kevin Schmitt, Zheng Zhang
9. Non-interactive zero knowledge proofs in the random oracle model / Vincenzo Iovino, Ivan Visconti
10. From quadratic functions to polynomials : generic functional encryption from standard assumptions / Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu.
[III]. Secret sharing: 11. Efficient proactive secret sharing for large data via concise vector commitments / Matthias Geihs, Lucas Schabhüser, Johannes Buchmann
12. Secret sharing using near-MDS codes / Sanyam Mehta, Vishal Saraswat, Smith Sen.
[IV]. Mathematics for cryptography: 13. On plateaued functions, linear structures and permutation polynomials / Sihem Mesnager, Kübra Kaytancı, Ferryg Özbudak
14. Faster scalar multiplication on the x-line : three-dimensional GLV method with three-dimensional differential addition chains / Hairong Yi, Guiwen Luo, Dongdai Lin.
[V]. Homomorphic encryption: 19. Securely aggregating testimonies with threshold multi-key FHE / Gerald Gavin, Stephane Bonnevay
20. Improved efficiency of a linearly homomorphic cryptosystem / Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler.
[VI]. Applied cryptography: 21. On the tracing traitors math : dedicated to the memory of Bob Blakley, pioneer of digital fingerprinting and inventor of secret sharing / Grigory Kabatiansky
22. Reusable garbled Turing machines without FHE / Yongge Wang, Qutaibah M. Malluhi
23. An extension of formal analysis method with reasoning : a case study of flaw detection for non-repudiation and fairness / Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng
24. A practical and insider secure signcryption with non-interactive non-repudiation / Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon.
[VII]. Security: 25. Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM systems / Said El Hajji, Nabil Moukafih, Ghizlane Irhanou
26. Managing your kleptographic subscription plan / George Teşeleanu
27. Model checking speculation-dependent security properties : abstracting and reducing processor models for sound and complete verification / Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro, Danilo Vendraminetto.
2. Cache-timing attacks still threaten IoT devices / Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain GUilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu
3. Speed-up of SCA attacks on 32-bit multiplications / Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad.
[II]. Cryptography: 4. Arabic cryptography and steganography in Morocco / Abdelmalek Azizi
5. An AEAD variant of the grain stream cipher / Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida
6. Construction for a nominative signature scheme from lattice with enhanced security / Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
7. Reinterpreting and improving the cryptanalysis of the Flash Player PRNG / George Teşeleanu
8. A key exchange based on the short integer solution problem and the learning with errors problem / Jintai Ding, Kevin Schmitt, Zheng Zhang
9. Non-interactive zero knowledge proofs in the random oracle model / Vincenzo Iovino, Ivan Visconti
10. From quadratic functions to polynomials : generic functional encryption from standard assumptions / Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu.
[III]. Secret sharing: 11. Efficient proactive secret sharing for large data via concise vector commitments / Matthias Geihs, Lucas Schabhüser, Johannes Buchmann
12. Secret sharing using near-MDS codes / Sanyam Mehta, Vishal Saraswat, Smith Sen.
[IV]. Mathematics for cryptography: 13. On plateaued functions, linear structures and permutation polynomials / Sihem Mesnager, Kübra Kaytancı, Ferryg Özbudak
14. Faster scalar multiplication on the x-line : three-dimensional GLV method with three-dimensional differential addition chains / Hairong Yi, Guiwen Luo, Dongdai Lin.
[V]. Homomorphic encryption: 19. Securely aggregating testimonies with threshold multi-key FHE / Gerald Gavin, Stephane Bonnevay
20. Improved efficiency of a linearly homomorphic cryptosystem / Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler.
[VI]. Applied cryptography: 21. On the tracing traitors math : dedicated to the memory of Bob Blakley, pioneer of digital fingerprinting and inventor of secret sharing / Grigory Kabatiansky
22. Reusable garbled Turing machines without FHE / Yongge Wang, Qutaibah M. Malluhi
23. An extension of formal analysis method with reasoning : a case study of flaw detection for non-repudiation and fairness / Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng
24. A practical and insider secure signcryption with non-interactive non-repudiation / Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon.
[VII]. Security: 25. Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM systems / Said El Hajji, Nabil Moukafih, Ghizlane Irhanou
26. Managing your kleptographic subscription plan / George Teşeleanu
27. Model checking speculation-dependent security properties : abstracting and reducing processor models for sound and complete verification / Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro, Danilo Vendraminetto.