All Stories

  1. Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes
  2. A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
  3. An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256
  4. Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace
  5. Embedded Computer Systems: Architectures, Modeling, and Simulation
  6. A Grover-Meets-Simon Approach to Match Vector Boolean Functions
  7. An Unprofiled Single Trace Side-Channel Attack for Asymmetric Cryptosystems
  8. Review of Policy-as-Code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems
  9. Availability, Reliability and Security
  10. Secure Audit Logs
  11. Secure Index
  12. Shuffle Index
  13. Top-k Query Processing on Encrypted Data
  14. Differentially Private ORAM
  15. Oblivious Parallel RAM (OPRAM)
  16. Oblivious RAM (ORAM)
  17. Privacy-Preserving Joins over Encrypted Data
  18. Private Boolean Queries on Encrypted Data
  19. Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-profiled Side Channel Attacks
  20. Solving the Subset Sum Problem via Quantum Walk Search
  21. A Quantum Method to Match Vector Boolean Functions using Simon's Solver
  22. Optimizing Quantum Circuit Synthesis with Dominator Analysis
  23. A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers
  24. Investigating the Health State of X.509 Digital Certificates
  25. Bit-Flipping Decoder Failure Rate Estimation for (v,w)-Regular Codes
  26. Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem
  27. A High Efficiency Hardware Design for the Post-Quantum KEM HQC
  28. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
  29. Differentially Private ORAM
  30. Privacy-Preserving Joins over Encrypted Data
  31. Top-k Query Processing on Encrypted Data
  32. A Versatile and Unified HQC Hardware Accelerator
  33. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
  34. Fault Attacks Friendliness of Post-quantum Cryptosystems
  35. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
  36. Oblivious RAM (ORAM)
  37. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  38. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  39. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  40. Oblivious Parallel RAM (OPRAM)
  41. Oblivious RAM (ORAM)
  42. Private Boolean Queries on Encrypted Data
  43. Secure Audit Logs
  44. Secure Index
  45. Quantum Computing Research Lines in the Italian Center for Supercomputing
  46. Locating Side Channel Leakage in Time through Matched Filters
  47. Profiled side channel attacks against the RSA cryptosystem using neural networks
  48. Shuffle Index
  49. Performance Bounds for QC-MDPC Codes Decoders
  50. A Complete Quantum Circuit to Solve the Information Set Decoding Problem
  51. Privacy-aware character pattern matching over outsourced encrypted data
  52. Integrating Side Channel Security in the FPGA Hardware Design Flow
  53. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  54. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  55. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  56. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  57. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  58. Efficient Oblivious Substring Search via Architectural Support
  59. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  60. Constant weight strings in constant time
  61. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  62. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  63. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  64. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  65. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  66. A Finite Regime Analysis of Information Set Decoding Algorithms
  67. A secure and authenticated host-to-memory communication interface
  68. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  69. Accelerating Automotive Analytics: The M2DC Appliance Approach
  70. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  71. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  72. Privacy preserving substring search protocol with polylogarithmic communication cost
  73. Systematic parsing of X.509: Eradicating security issues with a parse tree
  74. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  75. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  76. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  77. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  78. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  79. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  80. Three-Server Swapping for Access Confidentiality
  81. Enforcing authorizations while protecting access confidentiality1
  82. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  83. Side-channel security of superscalar CPUs
  84. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  85. Access Privacy in the Cloud
  86. The M2DC Approach towards Resource-efficient Computing
  87. A Novel Regular Format for X.509 Digital Certificates
  88. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  89. A Security Audit of the OpenPGP Format
  90. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  91. Encasing block ciphers to foil key recovery attempts via side channel
  92. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  93. V2I Cooperation for Traffic Management with SafeCop
  94. The M2DC Project: Modular Microserver DataCentre
  95. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  96. Data centres for IoT applications: The M2DC approach (Invited paper)
  97. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  98. A Fault-Based Secret Key Retrieval Method for ECDSA
  99. Access Control for the Shuffle Index
  100. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  101. Shuffle Index
  102. Foreword:
  103. Cyber-security analysis and evaluation for smart home management solutions
  104. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  105. Information leakage chaff
  106. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  107. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  108. Trusted Computing for Embedded Systems
  109. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  110. Protecting Access Confidentiality with Data Distribution and Swapping
  111. Practical Cryptography
  112. Fault Sensitivity Analysis at Design Time
  113. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  114. Design space extension for secure implementation of block ciphers
  115. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  116. Security challenges in building automation and SCADA
  117. Securing software cryptographic primitives for embedded systems against side channel attacks
  118. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  119. Snake: An End-to-End Encrypted Online Social Network
  120. A multiple equivalent execution trace approach to secure cryptographic embedded software
  121. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  122. [Copyright notice]
  123. On Task Assignment in Data Intensive Scalable Computing
  124. On the Security of Partially Masked Software Implementations
  125. Differential Fault Analysis for Block Ciphers
  126. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  127. Preface
  128. Supporting concurrency and multiple indexes in private access to outsourced data1
  129. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  130. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  131. Security Analysis of Building Automation Networks
  132. Distributed Shuffling for Preserving Access Confidentiality
  133. Secure and efficient design of software block cipher implementations on microcontrollers
  134. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  135. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  136. Theory and Practice of Cryptography Solutions for Secure Information Systems
  137. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  138. A code morphing methodology to automate power analysis countermeasures
  139. Injection Technologies for Fault Attacks on Microprocessors
  140. Smart metering in power grids: Application scenarios and security
  141. Security and Privacy in Smart Grid Infrastructures
  142. Efficient and Private Access to Outsourced Data
  143. Selective Exchange of Confidential Data in the Outsourcing Scenario
  144. Supporting Concurrency in Private Data Outsourcing
  145. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  146. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  147. Search over Encrypted Data
  148. Secure Audit Logs
  149. Secure Index
  150. Secure Logging
  151. Fault attack on AES with single-bit induced faults
  152. Low voltage fault attacks to AES
  153. Encryption-Based Policy Enforcement for Cloud Storage
  154. Record Setting Software Implementation of DES Using CUDA
  155. SMaC
  156. Countermeasures against fault attacks on software implemented AES
  157. Improving first order differential power attacks through digital signal processing
  158. Fast Disk Encryption through GPGPU Acceleration
  159. Low Voltage Fault Attacks on the RSA Cryptosystem
  160. A Transform-Parametric Approach to Boolean Matching
  161. Design of a parallel AES for graphics hardware using the CUDA framework
  162. A pairing SW implementation for Smart-Cards
  163. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  164. Preserving confidentiality of security policies in data outsourcing
  165. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  166. Countermeasures Against Branch Target Buffer Attacks
  167. Countermeasures Against Branch Target Buffer Attacks
  168. Program Organization
  169. A Unified Approach to Canonical Form-based Boolean Matching
  170. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  171. A unified approach to canonical form-based Boolean matching
  172. Computational intelligence techniques to detect toxic gas presence
  173. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  174. Software implementation of Tate pairing over GF(2/sup m/)
  175. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  176. The Role of the Normal Phonon–Phonon Scattering in the Lattice Thermal Conductivity and Phonon Drag in Metals at Low Temperatures
  177. The lattice thermal conductivity of aluminium at low temperatures
  178. Magnetic susceptibility of the singlet ground-state system (LaPr)Sn3
  179. Design Time Engineering of Side Channel Resistant Cipher Implementations