default search action
4th SPACE 2014: Pune, India
- Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont:
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings. Lecture Notes in Computer Science 8804, Springer 2014, ISBN 978-3-319-12059-1
Invited Paper I
- Phuong Ha Nguyen, Durga Prasad Sahoo:
Lightweight and Secure PUFs: A Survey (Invited Paper). 1-13
Cryptographic Building Blocks I
- Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? 14-27 - Andreas Enge, Jérôme Milan:
Implementing Cryptographic Pairings at Standard Security Levels. 28-46 - Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. 47-58 - Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. 59-75 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme. 76-91
Invited Paper II
- Radim Ostádal, Petr Svenda, Václav Matyás:
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper). 92-109
Mini Tutorial
- Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai:
Differential Power Analysis Attack on SIMON and LED Block Ciphers. 110-125
Cryptographic Building Blocks II
- Souvik Kolay, Debdeep Mukhopadhyay:
Khudra: A New Lightweight Block Cipher for FPGAs. 126-145 - Sashank Dara, Scott R. Fluhrer:
FNR: Arbitrary Length Small Domain Block Cipher Proposal. 146-154 - Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. 155-170 - Raghuvir Songhela, Manik Lal Das:
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. 171-182
Attacks and Countermeasures
- Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. 183-200 - Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Analysis and Improvements of the DPA Contest v4 Implementation. 201-218 - Subhabrata Samajder, Palash Sarkar:
Some Randomness Experiments on TRIVIUM. 219-236
Tools and Methods
- Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Randomized Batch Verification of Standard ECDSA Signatures. 237-255 - Sabyasachi Karati, Abhijit Das:
Batch Verification of EdDSA Signatures. 256-271 - Marek Sýs, Zdenek Ríha:
Faster Randomness Testing with the NIST Statistical Test Suite. 272-284
Secure Systems and Applications
- Jungmin Park, Akhilesh Tyagi:
t-Private Systems: Unified Private Memories and Computation. 285-302 - A. M. Aswini, P. Vinod:
Android Malware Analysis Using Ensemble Features. 303-318 - K. A. Asmitha, P. Vinod:
Linux Malware Detection Using eXtended-Symmetric Uncertainty. 319-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.