All Stories

  1. Oblivious RAM (ORAM)
  2. Improving the Efficiency of Quantum Circuits for Information Set Decoding
  3. A flexible NTRU cryptographic accelerator for Application Specific Integrated Circuits
  4. An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  5. Oblivious Parallel RAM (OPRAM)
  6. Oblivious RAM (ORAM)
  7. Locating Side Channel Leakage in Time through Matched Filters
  8. Shuffle Index
  9. Privacy-aware character pattern matching over outsourced encrypted data
  10. Integrating Side Channel Security in the FPGA Hardware Design Flow
  11. Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
  12. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
  13. Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems
  14. Exploring Cortex-M Microarchitectural Side Channel Information Leakage
  15. Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
  16. Efficient Oblivious Substring Search via Architectural Support
  17. A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems
  18. Constant weight strings in constant time
  19. A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  20. Working Age: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling
  21. Decision Support Systems to Promote Health and Well-Being of People During Their Working Age: The Case of the WorkingAge EU Project
  22. Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
  23. Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
  24. A Finite Regime Analysis of Information Set Decoding Algorithms
  25. A secure and authenticated host-to-memory communication interface
  26. Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks
  27. Accelerating Automotive Analytics: The M2DC Appliance Approach
  28. LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate
  29. Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks
  30. Privacy preserving substring search protocol with polylogarithmic communication cost
  31. Systematic parsing of X.509: Eradicating security issues with a parse tree
  32. Reactive side-channel countermeasures: Applicability and quantitative security evaluation
  33. A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
  34. M2DC—A Novel Heterogeneous Hyperscale Microserver Platform
  35. Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks
  36. OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
  37. Side-channel security of superscalar CPUs : Evaluating the Impact of Micro-architectural Features
  38. Three-Server Swapping for Access Confidentiality
  39. Enforcing authorizations while protecting access confidentiality1
  40. LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
  41. Side-channel security of superscalar CPUs
  42. Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  43. Access Privacy in the Cloud
  44. The M2DC Approach towards Resource-efficient Computing
  45. A Novel Regular Format for X.509 Digital Certificates
  46. M2DC – Modular Microserver DataCentre with heterogeneous hardware
  47. A Security Audit of the OpenPGP Format
  48. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud
  49. A privacy-preserving encrypted OSN with stateless server interaction: The Snake design
  50. V2I Cooperation for Traffic Management with SafeCop
  51. The M2DC Project: Modular Microserver DataCentre
  52. Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
  53. Data centres for IoT applications: The M2DC approach (Invited paper)
  54. Automated instantiation of side-channel attacks countermeasures for software cipher implementations
  55. A Fault-Based Secret Key Retrieval Method for ECDSA
  56. Access Control for the Shuffle Index
  57. A Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)
  58. Encasing block ciphers to foil key recovery attempts via side channel
  59. Shuffle Index
  60. Cyber-security analysis and evaluation for smart home management solutions
  61. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
  62. Information leakage chaff
  63. Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
  64. Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  65. Trusted Computing for Embedded Systems
  66. Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
  67. Protecting Access Confidentiality with Data Distribution and Swapping
  68. Practical Cryptography
  69. Fault Sensitivity Analysis at Design Time
  70. Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  71. Design space extension for secure implementation of block ciphers
  72. Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architectures
  73. Security challenges in building automation and SCADA
  74. Securing software cryptographic primitives for embedded systems against side channel attacks
  75. OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
  76. Snake: An End-to-End Encrypted Online Social Network
  77. A multiple equivalent execution trace approach to secure cryptographic embedded software
  78. Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
  79. [Copyright notice]
  80. On Task Assignment in Data Intensive Scalable Computing
  81. On the Security of Partially Masked Software Implementations
  82. Differential Fault Analysis for Block Ciphers
  83. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
  84. Supporting concurrency and multiple indexes in private access to outsourced data1
  85. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
  86. Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
  87. Security Analysis of Building Automation Networks
  88. Distributed Shuffling for Preserving Access Confidentiality
  89. Secure and efficient design of software block cipher implementations on microcontrollers
  90. Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
  91. Compiler-based side channel vulnerability analysis and optimized countermeasures application
  92. Theory and Practice of Cryptography Solutions for Secure Information Systems
  93. Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
  94. A code morphing methodology to automate power analysis countermeasures
  95. Injection Technologies for Fault Attacks on Microprocessors
  96. Smart metering in power grids: Application scenarios and security
  97. Security and Privacy in Smart Grid Infrastructures
  98. Efficient and Private Access to Outsourced Data
  99. Selective Exchange of Confidential Data in the Outsourcing Scenario
  100. Supporting Concurrency in Private Data Outsourcing
  101. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
  102. Information Leakage Discovery Techniques to Enhance Secure Chip Design
  103. Search over Encrypted Data
  104. Secure Audit Logs
  105. Secure Index
  106. Secure Logging
  107. Fault attack on AES with single-bit induced faults
  108. Low voltage fault attacks to AES
  109. Encryption-Based Policy Enforcement for Cloud Storage
  110. Record Setting Software Implementation of DES Using CUDA
  111. SMaC
  112. Countermeasures against fault attacks on software implemented AES
  113. Improving first order differential power attacks through digital signal processing
  114. Fast Disk Encryption through GPGPU Acceleration
  115. Low Voltage Fault Attacks on the RSA Cryptosystem
  116. A Transform-Parametric Approach to Boolean Matching
  117. Design of a parallel AES for graphics hardware using the CUDA framework
  118. A pairing SW implementation for Smart-Cards
  119. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp
  120. Preserving confidentiality of security policies in data outsourcing
  121. Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
  122. Countermeasures Against Branch Target Buffer Attacks
  123. Countermeasures Against Branch Target Buffer Attacks
  124. Program Organization
  125. A Unified Approach to Canonical Form-based Boolean Matching
  126. Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications
  127. A unified approach to canonical form-based Boolean matching
  128. Computational intelligence techniques to detect toxic gas presence
  129. Parallel Hardware Architectures for the Cryptographic Tate Pairing
  130. Software implementation of Tate pairing over GF(2/sup m/)
  131. Efficient implementations of mobile video computations on domain-specific reconfigurable arrays
  132. Design Time Engineering of Side Channel Resistant Cipher Implementations