All Stories

  1. A high efficiency AVX2-optimized engineering of the post-quantum digital signature CROSS
  2. The CAPSARII Approach to Cyber-Secure Wearable, Ultra-Low-Power Networked Sensors for Soldier Health Monitoring
  3. Improving Quantum Compilation via Circuit Partitioning and Floorplanning
  4. Enhancing Quantum Circuit Compilation with Modular Floorplanning
  5. Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes
  6. A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
  7. An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256
  8. Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace
  9. Embedded Computer Systems: Architectures, Modeling, and Simulation
  10. A Grover-Meets-Simon Approach to Match Vector Boolean Functions
  11. An Unprofiled Single Trace Side-Channel Attack for Asymmetric Cryptosystems
  12. Review of Policy-as-Code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems
  13. Availability, Reliability and Security
  14. Secure Audit Logs
  15. Secure Index
  16. Shuffle Index
  17. Top-k Query Processing on Encrypted Data
  18. Differentially Private ORAM
  19. Oblivious Parallel RAM (OPRAM)
  20. Oblivious RAM (ORAM)
  21. Privacy-Preserving Joins over Encrypted Data
  22. Private Boolean Queries on Encrypted Data
  23. Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-profiled Side Channel Attacks
  24. Solving the Subset Sum Problem via Quantum Walk Search
  25. A Quantum Method to Match Vector Boolean Functions using Simon's Solver
  26. Optimizing Quantum Circuit Synthesis with Dominator Analysis
  27. A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers
  28. Investigating the Health State of X.509 Digital Certificates
  29. Bit-Flipping Decoder Failure Rate Estimation for (v,w)-Regular Codes
  30. Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem
  31. A High Efficiency Hardware Design for the Post-Quantum KEM HQC
  32. Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems
  33. Differentially Private ORAM
  34. Privacy-Preserving Joins over Encrypted Data
  35. Top-k Query Processing on Encrypted Data
  36. A Versatile and Unified HQC Hardware Accelerator
  37. Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding
  38. Fault Attacks Friendliness of Post-quantum Cryptosystems
  39. A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
  40. Oblivious RAM (ORAM)
  41. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  42. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  43. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  44. Oblivious Parallel RAM (OPRAM)
  45. Oblivious RAM (ORAM)
  46. Private Boolean Queries on Encrypted Data
  47. Secure Audit Logs
  48. Secure Index
  49. Quantum Computing Research Lines in the Italian Center for Supercomputing
  50. Locating Side Channel Leakage in Time through Matched Filters
  51. Profiled side channel attacks against the RSA cryptosystem using neural networks
  52. Shuffle Index
  53. Performance Bounds for QC-MDPC Codes Decoders
  54. A Complete Quantum Circuit to Solve the Information Set Decoding Problem
  55. Privacy-aware character pattern matching over outsourced encrypted data
  56. Integrating Side Channel Security in the FPGA Hardware Design Flow
  57. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  58. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  59. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  60. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  61. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  62. Efficient Oblivious Substring Search via Architectural Support
  63. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  64. Constant weight strings in constant time
  65. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  66. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  67. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  68. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  69. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  70. A Finite Regime Analysis of Information Set Decoding Algorithms
  71. A secure and authenticated host-to-memory communication interface
  72. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  73. Accelerating Automotive Analytics: The M2DC Appliance Approach
  74. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  75. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  76. Privacy preserving substring search protocol with polylogarithmic communication cost
  77. Systematic parsing of X.509: Eradicating security issues with a parse tree
  78. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  79. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  80. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  81. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  82. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  83. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  84. Three-Server Swapping for Access Confidentiality
  85. Enforcing authorizations while protecting access confidentiality1
  86. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  87. Side-channel security of superscalar CPUs
  88. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  89. Access Privacy in the Cloud
  90. The M2DC Approach towards Resource-efficient Computing
  91. A Novel Regular Format for X.509 Digital Certificates
  92. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  93. A Security Audit of the OpenPGP Format
  94. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  95. Encasing block ciphers to foil key recovery attempts via side channel
  96. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  97. V2I Cooperation for Traffic Management with SafeCop
  98. The M2DC Project: Modular Microserver DataCentre
  99. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  100. Data centres for IoT applications: The M2DC approach (Invited paper)
  101. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  102. A Fault-Based Secret Key Retrieval Method for ECDSA
  103. Access Control for the Shuffle Index
  104. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  105. Shuffle Index
  106. Foreword:
  107. Cyber-security analysis and evaluation for smart home management solutions
  108. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  109. Information leakage chaff
  110. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  111. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  112. Trusted Computing for Embedded Systems
  113. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  114. Protecting Access Confidentiality with Data Distribution and Swapping
  115. Practical Cryptography
  116. Fault Sensitivity Analysis at Design Time
  117. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  118. Design space extension for secure implementation of block ciphers
  119. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  120. Security challenges in building automation and SCADA
  121. Securing software cryptographic primitives for embedded systems against side channel attacks
  122. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  123. Snake: An End-to-End Encrypted Online Social Network
  124. A multiple equivalent execution trace approach to secure cryptographic embedded software
  125. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  126. [Copyright notice]
  127. On Task Assignment in Data Intensive Scalable Computing
  128. On the Security of Partially Masked Software Implementations
  129. Differential Fault Analysis for Block Ciphers
  130. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  131. Preface
  132. Supporting concurrency and multiple indexes in private access to outsourced data1
  133. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  134. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  135. Security Analysis of Building Automation Networks
  136. Distributed Shuffling for Preserving Access Confidentiality
  137. Secure and efficient design of software block cipher implementations on microcontrollers
  138. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  139. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  140. Theory and Practice of Cryptography Solutions for Secure Information Systems
  141. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  142. A code morphing methodology to automate power analysis countermeasures
  143. Injection Technologies for Fault Attacks on Microprocessors
  144. Smart metering in power grids: Application scenarios and security
  145. Security and Privacy in Smart Grid Infrastructures
  146. Efficient and Private Access to Outsourced Data
  147. Selective Exchange of Confidential Data in the Outsourcing Scenario
  148. Supporting Concurrency in Private Data Outsourcing
  149. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  150. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  151. Search over Encrypted Data
  152. Secure Audit Logs
  153. Secure Index
  154. Secure Logging
  155. Fault attack on AES with single-bit induced faults
  156. Low voltage fault attacks to AES
  157. Encryption-Based Policy Enforcement for Cloud Storage
  158. Record Setting Software Implementation of DES Using CUDA
  159. SMaC
  160. Countermeasures against fault attacks on software implemented AES
  161. Improving first order differential power attacks through digital signal processing
  162. Fast Disk Encryption through GPGPU Acceleration
  163. Low Voltage Fault Attacks on the RSA Cryptosystem
  164. A Transform-Parametric Approach to Boolean Matching
  165. Design of a parallel AES for graphics hardware using the CUDA framework
  166. A pairing SW implementation for Smart-Cards
  167. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  168. Preserving confidentiality of security policies in data outsourcing
  169. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  170. Countermeasures Against Branch Target Buffer Attacks
  171. Countermeasures Against Branch Target Buffer Attacks
  172. Program Organization
  173. A Unified Approach to Canonical Form-based Boolean Matching
  174. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  175. A unified approach to canonical form-based Boolean matching
  176. Computational intelligence techniques to detect toxic gas presence
  177. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  178. Software implementation of Tate pairing over GF(2/sup m/)
  179. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  180. The Role of the Normal Phonon–Phonon Scattering in the Lattice Thermal Conductivity and Phonon Drag in Metals at Low Temperatures
  181. The lattice thermal conductivity of aluminium at low temperatures
  182. Magnetic susceptibility of the singlet ground-state system (LaPr)Sn3
  183. Design Time Engineering of Side Channel Resistant Cipher Implementations