


default search action
22nd SAC 2015: Sackville, NB, Canada
- Orr Dunkelman, Liam Keliher:

Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9566, Springer 2016, ISBN 978-3-319-31300-9
Privacy Enhancing Technologies
- Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:

Formal Treatment of Privacy-Enhancing Credential Systems. 3-24 - Marie Paindavoine, Bastien Vialla:

Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption. 25-43 - Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana:

Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks. 44-64
Cryptanalysis of Symmetric-Key Primitives
- Muhammed F. Esgin, Orhun Kara

:
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 67-85 - Anne Canteaut, Virginie Lallemand, María Naya-Plasencia:

Related-Key Attack on Full-Round PICARO. 86-101 - Alex Biryukov

, Gaëtan Leurent
, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. 102-121 - Li Lin, Wenling Wu, Yafei Zheng:

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 122-142
Implementation of Cryptographic Schemes
- Tung Chou

:
Sandy2x: New Curve25519 Speed Records. 145-160 - Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:

ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p). 161-177 - Subhadeep Banik

, Andrey Bogdanov
, Francesco Regazzoni
:
Exploring Energy Efficiency of Lightweight Block Ciphers. 178-194
Short Papers
- Willem Schroé, Bart Mennink, Elena Andreeva

, Bart Preneel
:
Forgery and Subkey Recovery on CAESAR Candidate iFeed. 197-204 - Chrysanthi Mavromati:

Key-Recovery Attacks Against the MAC Algorithm Chaskey. 205-216 - Gaëtan Leurent

:
Differential Forgery Attack Against LAC. 217-224
Privacy Preserving Data Processing
- Thomas Vannet, Noboru Kunihiro

:
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem. 227-240 - Attila Altay Yavuz

, Jorge Guajardo:
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 241-259
Side Channel Attacks and Defenses
- Pascal Sasdrich

, Amir Moradi
, Tim Güneysu
:
Affine Equivalence and Its Application to Tightening Threshold Implementations. 263-276 - Baris Ege, Thomas Eisenbarth

, Lejla Batina:
Near Collision Side Channel Attacks. 277-292 - Cong Chen, Thomas Eisenbarth

, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. 293-309 - Andrey Bogdanov

, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser
, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. 310-327
New Cryptographic Constructions
- Kassem Kalach, Reihaneh Safavi-Naini:

An Efficient Post-Quantum One-Time Signature Scheme. 331-351 - Zhiyuan Guo, Wenling Wu, Si Gao

:
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure. 352-372 - Anne Canteaut, Sébastien Duval

, Gaëtan Leurent
:
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures. 373-393
Authenticated Encryption
- Yu Sasaki, Kan Yasuda:

A New Mode of Operation for Incremental Authenticated Encryption with Associated Data. 397-416 - Dhiman Saha, Dipanwita Roy Chowdhury:

Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. 417-438
On the Hardness of Mathematical Problems
- Mingqiang Wang, Tao Zhan, Haibin Zhang:

Bit Security of the CDH Problems over Finite Fields. 441-461 - Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:

Towards Optimal Bounds for Implicit Factorization Problem. 462-476
Cryptanalysis of Authenticated Encryption Schemes
- Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
:
Forgery Attacks on Round-Reduced ICEPOLE-128. 479-492 - Jérémy Jean, Yu Sasaki, Lei Wang:

Analysis of the CAESAR Candidate Silver. 493-509 - Ivan Tjuawinata, Tao Huang, Hongjun Wu

:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. 510-526

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














