All Stories

  1. A high efficiency AVX2-optimized engineering of the post-quantum digital signature CROSS
  2. Quantum Oracle Synthesis from HDL Designs via Multi Level Intermediate Representation
  3. On the Hardness of Decoding Quasi-Cyclic Codes and the Security of Code-Based Public-Key Cryptosystems
  4. The CAPSARII Approach to Cyber-Secure Wearable, Ultra-Low-Power Networked Sensors for Soldier Health Monitoring
  5. Improving Quantum Compilation via Circuit Partitioning and Floorplanning
  6. Enhancing Quantum Circuit Compilation with Modular Floorplanning
  7. Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes
  8. A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
  9. An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256
  10. Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace
  11. Embedded Computer Systems: Architectures, Modeling, and Simulation
  12. A Grover-Meets-Simon Approach to Match Vector Boolean Functions
  13. An Unprofiled Single Trace Side-Channel Attack for Asymmetric Cryptosystems
  14. Review of Policy-as-Code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems
  15. Availability, Reliability and Security
  16. Secure Audit Logs
  17. Secure Index
  18. Shuffle Index
  19. Top-k Query Processing on Encrypted Data
  20. Differentially Private ORAM
  21. Oblivious Parallel RAM (OPRAM)
  22. Oblivious RAM (ORAM)
  23. Privacy-Preserving Joins over Encrypted Data
  24. Private Boolean Queries on Encrypted Data
  25. Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-profiled Side Channel Attacks
  26. Solving the Subset Sum Problem via Quantum Walk Search
  27. A Quantum Method to Match Vector Boolean Functions using Simon's Solver
  28. Optimizing Quantum Circuit Synthesis with Dominator Analysis
  29. A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers
  30. Investigating the Health State of X.509 Digital Certificates
  31. Bit-Flipping Decoder Failure Rate Estimation for (v,w)-Regular Codes
  32. Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem
  33. A High Efficiency Hardware Design for the Post-Quantum KEM HQC
  34. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
  35. Differentially Private ORAM
  36. Privacy-Preserving Joins over Encrypted Data
  37. Top-k Query Processing on Encrypted Data
  38. A Versatile and Unified HQC Hardware Accelerator
  39. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
  40. Fault Attacks Friendliness of Post-quantum Cryptosystems
  41. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
  42. Oblivious RAM (ORAM)
  43. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  44. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  45. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  46. Oblivious Parallel RAM (OPRAM)
  47. Oblivious RAM (ORAM)
  48. Private Boolean Queries on Encrypted Data
  49. Secure Audit Logs
  50. Secure Index
  51. Quantum Computing Research Lines in the Italian Center for Supercomputing
  52. Locating Side Channel Leakage in Time through Matched Filters
  53. Profiled side channel attacks against the RSA cryptosystem using neural networks
  54. Shuffle Index
  55. Performance Bounds for QC-MDPC Codes Decoders
  56. A Complete Quantum Circuit to Solve the Information Set Decoding Problem
  57. Privacy-aware character pattern matching over outsourced encrypted data
  58. Integrating Side Channel Security in the FPGA Hardware Design Flow
  59. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  60. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  61. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  62. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  63. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  64. Efficient Oblivious Substring Search via Architectural Support
  65. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  66. Constant weight strings in constant time
  67. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  68. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  69. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  70. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  71. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  72. A Finite Regime Analysis of Information Set Decoding Algorithms
  73. A secure and authenticated host-to-memory communication interface
  74. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  75. Accelerating Automotive Analytics: The M2DC Appliance Approach
  76. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  77. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  78. Privacy preserving substring search protocol with polylogarithmic communication cost
  79. Systematic parsing of X.509: Eradicating security issues with a parse tree
  80. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  81. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  82. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  83. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  84. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  85. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  86. Three-Server Swapping for Access Confidentiality
  87. Enforcing authorizations while protecting access confidentiality1
  88. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  89. Side-channel security of superscalar CPUs
  90. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  91. Access Privacy in the Cloud
  92. The M2DC Approach towards Resource-efficient Computing
  93. A Novel Regular Format for X.509 Digital Certificates
  94. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  95. A Security Audit of the OpenPGP Format
  96. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  97. Encasing block ciphers to foil key recovery attempts via side channel
  98. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  99. V2I Cooperation for Traffic Management with SafeCop
  100. The M2DC Project: Modular Microserver DataCentre
  101. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  102. Data centres for IoT applications: The M2DC approach (Invited paper)
  103. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  104. A Fault-Based Secret Key Retrieval Method for ECDSA
  105. Access Control for the Shuffle Index
  106. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  107. Shuffle Index
  108. Foreword:
  109. Cyber-security analysis and evaluation for smart home management solutions
  110. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  111. Information leakage chaff
  112. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  113. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  114. Trusted Computing for Embedded Systems
  115. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  116. Protecting Access Confidentiality with Data Distribution and Swapping
  117. Practical Cryptography
  118. Fault Sensitivity Analysis at Design Time
  119. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  120. Design space extension for secure implementation of block ciphers
  121. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  122. Security challenges in building automation and SCADA
  123. Securing software cryptographic primitives for embedded systems against side channel attacks
  124. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  125. Snake: An End-to-End Encrypted Online Social Network
  126. A multiple equivalent execution trace approach to secure cryptographic embedded software
  127. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  128. [Copyright notice]
  129. On Task Assignment in Data Intensive Scalable Computing
  130. On the Security of Partially Masked Software Implementations
  131. Differential Fault Analysis for Block Ciphers
  132. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  133. Preface
  134. Supporting concurrency and multiple indexes in private access to outsourced data1
  135. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  136. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  137. Security Analysis of Building Automation Networks
  138. Distributed Shuffling for Preserving Access Confidentiality
  139. Secure and efficient design of software block cipher implementations on microcontrollers
  140. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  141. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  142. Theory and Practice of Cryptography Solutions for Secure Information Systems
  143. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  144. A code morphing methodology to automate power analysis countermeasures
  145. Injection Technologies for Fault Attacks on Microprocessors
  146. Smart metering in power grids: Application scenarios and security
  147. Security and Privacy in Smart Grid Infrastructures
  148. Efficient and Private Access to Outsourced Data
  149. Selective Exchange of Confidential Data in the Outsourcing Scenario
  150. Supporting Concurrency in Private Data Outsourcing
  151. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  152. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  153. Search over Encrypted Data
  154. Secure Audit Logs
  155. Secure Index
  156. Secure Logging
  157. Fault attack on AES with single-bit induced faults
  158. Low voltage fault attacks to AES
  159. Encryption-Based Policy Enforcement for Cloud Storage
  160. Record Setting Software Implementation of DES Using CUDA
  161. SMaC
  162. Countermeasures against fault attacks on software implemented AES
  163. Improving first order differential power attacks through digital signal processing
  164. Fast Disk Encryption through GPGPU Acceleration
  165. Low Voltage Fault Attacks on the RSA Cryptosystem
  166. A Transform-Parametric Approach to Boolean Matching
  167. Design of a parallel AES for graphics hardware using the CUDA framework
  168. A pairing SW implementation for Smart-Cards
  169. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  170. Preserving confidentiality of security policies in data outsourcing
  171. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  172. Countermeasures Against Branch Target Buffer Attacks
  173. Countermeasures Against Branch Target Buffer Attacks
  174. Program Organization
  175. A Unified Approach to Canonical Form-based Boolean Matching
  176. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  177. A unified approach to canonical form-based Boolean matching
  178. Computational intelligence techniques to detect toxic gas presence
  179. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  180. Software implementation of Tate pairing over GF(2/sup m/)
  181. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  182. The Role of the Normal Phonon–Phonon Scattering in the Lattice Thermal Conductivity and Phonon Drag in Metals at Low Temperatures
  183. The lattice thermal conductivity of aluminium at low temperatures
  184. Magnetic susceptibility of the singlet ground-state system (LaPr)Sn3
  185. Design Time Engineering of Side Channel Resistant Cipher Implementations