Deliverables
Preliminary Fellow Report Y1
Half way Review of Dissemination, Press and Outreach StrategyIntermediate Status of dissemination and outreach
Career Development Plan Y3Preliminary Fellow Report Y3
Yearly report on training Y1Written evaluation on training activities
Final Report on Dissemination, Press and Outreach StrategyFinal status of dissemination and outreach activities
Technical Report on First designs for IoT and the CloudFirst designs for IoT and the Cloud
Dissemination, Press and Outreach StrategyStrategy on dissemination and outreach
Final Career Development Plan Y4Final Fellow Report Y4
Progress Reportthe Progress report M13 relates to the milestone on completion of the recruitment phase and includes general update on the project progress (technical implementation and management).
Tech report on Implementation resultsYearly report on training Y3
Written evaluation on training activities
Awarding of doctoral degreesList of ESRs with doctoral degrees
Draft Periodic ReportThis report includes general update on the project progress (technical implementation and management) and is a preparatory document for the project review meeting.
Yearly report on training Y2Written evaluation on training activities
Yearly report on training Y4Written evaluation on training activities
Technical Report on Requirements and design constraints for IoT and CloudRequirements and design constraints for IoT and Cloud
Career Development Plan Y2Preliminary Fellow Report Y2
Technical report on Final designs and implementationsFinal designs and implementations
Recruitment of the ESRs by all beneficiaries
Supervisory Board of the networkThe Supervisory Board as the executive body of the ETN; The Supervisory Board (SB) will be responsible for the overall strategic and scientific management of the network and reports directly to the GA. The SB will be composed of the coordinator, the supervisors, the co-supervisors and external stakeholders from industry and government. The diversity of this board is intended to ensure ongoing relevance of the Network and that integration benefits from the expertise of all relevant parties. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions. The annual meetings of supervisory board, general assembly meeting and fellow council meeting will be co-located with network wide training events in order to keep travel overhead low. External stakeholders that will serve on the Supervisory Board include Claire Vishik (Intel), Moti Yung (Google), and Kaisa Nyberg (Aalto University); in addition a representative from ENISA (European Network and Information Security Agency) will be invited. The Supervisory Board oversees integration of the research goals within the project and provides advice on all strategic issues relevant to both scientific and administrative aspects. The Supervisory Board will fulfil other specific tasks including the initiation, coordination and organization of the workpackages and the support of the Coordinator in its tasks. It will also monitor and coordinate all planned trainings events within the ITN. The Supervisory Board will be responsible for adjusting the work plan if there are any disruptions such as the recruitment not going to according to a plan, or fellow leaving the network and so on. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions.
ESRs declarationsCollecting all ESR declarations
Publications
Author(s):
Thomas Decru and Lorenz Panny and Frederik Vercauteren
Published in:
PQCrypto 2019, 2019, Page(s) to appear
Publisher:
Springer
Author(s):
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Published in:
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 395-427, ISBN 978-3-030-03331-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-03332-3_15
Author(s):
Gustavo Banegas, Daniel J. Bernstein
Published in:
Selected Areas in Cryptography – SAC 2017, Issue 10719, 2018, Page(s) 325-335, ISBN 978-3-319-72564-2
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_16
Author(s):
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Published in:
Progress in Cryptology – AFRICACRYPT 2018, Issue 10831, 2018, Page(s) 203-216, ISBN 978-3-319-89338-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-89339-6_12
Author(s):
Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
Published in:
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 483-512, ISBN 978-3-319-96877-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-96878-0_17
Author(s):
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Published in:
Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 216-234, ISBN 978-3-030-10969-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-10970-7_10
Author(s):
Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Published in:
Advances in Cryptology – CRYPTO 2016, Issue 9815, 2016, Page(s) 62-89, ISBN 978-3-662-53007-8
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53008-5_3
Author(s):
Julian Biendarra, Jasmin Christian Blanchette, Aymeric Bouzy, Martin Desharnais, Mathias Fleury, Johannes Hölzl, Ondřej Kunčar, Andreas Lochbihler, Fabian Meier, Lorenz Panny, Andrei Popescu, Christian Sternagel, René Thiemann, Dmitriy Traytel
Published in:
Frontiers of Combining Systems, Issue 10483, 2017, Page(s) 3-21, ISBN 978-3-319-66166-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-66167-4_1
Author(s):
Ralph Ankele, Florian Böhl, Simon Friedberger
Published in:
Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 381-399, ISBN 978-3-319-93386-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-93387-0_20
Author(s):
Ralph Ankele, Stefan Kölbl
Published in:
Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 163-190, ISBN 978-3-030-10969-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-10970-7_8
Author(s):
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in:
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117, ISBN 978-3-030-03331-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-03332-3_4
Author(s):
Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
Published in:
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 275-305, ISBN 978-3-319-96883-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-96884-1_10
Author(s):
Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
Published in:
Progress in Cryptology – AFRICACRYPT 2016, Issue 9646, 2016, Page(s) 147-166, ISBN 978-3-319-31516-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31517-1_8
Author(s):
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
Published in:
Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 208-228, ISBN 978-3-319-61203-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-61204-1_11
Author(s):
Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Published in:
Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 598-628, ISBN 978-3-319-70693-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-70694-8_21
Author(s):
Rémi Géraud, David Naccache, Răzvan Roşie
Published in:
Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 149-168, ISBN 978-3-030-12611-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-12612-4_8
Author(s):
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Published in:
Theory of Cryptography, Issue 9985, 2016, Page(s) 554-581, ISBN 978-3-662-53640-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53641-4_21
Author(s):
Răzvan Roşie
Published in:
Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Issue 11124, 2018, Page(s) 440-459, ISBN 978-3-030-00433-0
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-00434-7_22
Author(s):
Rémi Géraud, David Naccache, Răzvan Roşie
Published in:
Security and Privacy in Communication Networks, Issue 238, 2018, Page(s) 108-127, ISBN 978-3-319-78812-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-78813-5_6
Author(s):
Ralph Ankele, Eik List
Published in:
Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 459-475, ISBN 978-3-319-93386-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-93387-0_24
Author(s):
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
Published in:
Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 229-249, ISBN 978-3-319-61203-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-61204-1_12
Author(s):
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in:
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33, ISBN 978-3-319-96877-3
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-96878-0_1
Author(s):
Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
Published in:
Journal of Mathematical Cryptology, Issue to appear, 2019, ISSN 1862-2976
Publisher:
Walter de Gruyter GmbH & Co. KG
Author(s):
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Published in:
Journal of Mathematical Cryptology, Issue 12/4, 2018, Page(s) 221-239, ISSN 1862-2976
Publisher:
Walter de Gruyter GmbH & Co. KG
DOI:
10.1515/jmc-2018-0027
Author(s):
Gustavo Banegas, Ricardo Custódio, Daniel Panario
Published in:
Journal of Cryptographic Engineering, 2019, ISSN 2190-8508
Publisher:
Springer Science + Business Media
DOI:
10.1007/s13389-018-0197-6
Author(s):
Joppe Bos, Simon Friedberger
Published in:
IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TC.2018.2851238
Author(s):
Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng
Published in:
Finite Fields and Their Applications, Issue 55, 2019, Page(s) 177-201, ISSN 1071-5797
Publisher:
Academic Press
DOI:
10.1016/j.ffa.2018.10.001
Author(s):
Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke
Published in:
IACR Transactions on Symmetric Cryptology 1–43, Issue 1, 2019, ISSN 2519-173X
Publisher:
IACR
DOI:
10.5281/zenodo.2593578
Author(s):
Lacharité, M.-S; Paterson, K.
Published in:
IACR Transactions on Symmetric Cryptology 2018(1) 277-313, Issue 1, 2018, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2018.i1.277-313
Author(s):
Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang
Published in:
Cryptography and Communications, 2018, ISSN 1936-2447
Publisher:
Springer Pub. Co.,
DOI:
10.1007/s12095-018-0324-3
Author(s):
Guido Bertoni, Marco Martinoli, Maria Chiara Molteni
Published in:
Journal of Hardware and Systems Security, Issue 1/3, 2017, Page(s) 269-281, ISSN 2509-3428
Publisher:
Springer
DOI:
10.1007/s41635-017-0015-0
Author(s):
Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Published in:
SCIENCE CHINA Information Sciences, Issue 1, 2018, ISSN 1869-1919
Publisher:
Springer
DOI:
10.5281/zenodo.2593621
Author(s):
Marie-Sarah Lacharité
Published in:
Cryptography and Communications, Issue 10/1, 2018, Page(s) 41-58, ISSN 1936-2447
Publisher:
Springer Pub. Co.,
DOI:
10.1007/s12095-017-0253-6
Author(s):
Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong
Published in:
Finite Fields and Their Applications 51(May 2018) 31-61, Issue 1, 2018, ISSN 1071-5797
Publisher:
Academic Press
DOI:
10.5281/zenodo.2594493
Author(s):
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in:
Journal of Cryptographic Engineering, Issue 7/2, 2017, Page(s) 149-165, ISSN 2190-8508
Publisher:
Springer Science + Business Media
DOI:
10.1007/s13389-017-0156-7
Author(s):
Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
Published in:
IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971
Publisher:
IEEE Computer Society
DOI:
10.1109/TDSC.2018.2857770
Author(s):
Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan
Published in:
IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 449-473, ISSN 2519-173X
Publisher:
Ruhr University of Bochum
DOI:
10.13154/tosc.v2017.i1.449-473
Author(s):
Chaoyun Li and Qingju Wang
Published in:
IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 129-155, ISSN 2519-173X
Publisher:
Ruhr University of Bochum
DOI:
10.13154/tosc.v2017.i1.129-155
Author(s):
Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
Published in:
IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 398-404, ISSN 2519-173X
Publisher:
Ruhr University of Bochum
DOI:
10.13154/tosc.v2017.i1.398-404
Author(s):
Barnett, Anthony; Bonte, Charlotte; Bootland, Carl; Bos, Joppe W.; Castryck, Wouter; Costache, Anamaria; Goubin, Louis; Iliashenko, Ilia; Lepoint, Tancrède; Minelli, Michele; Paillier, Pascal; Smart, Nigel P.; Vercauteren, Frederik; Vivek, Srinivas; Waller, Adrian
Published in:
Issue 1, 2017
Publisher:
Workshop on Data Mining with Secure Computation
DOI:
10.5281/zenodo.2594695
Author(s):
Victor Arribas, Thomas De Cnudde, Danilo Sijacic
Published in:
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018, Page(s) 27-34, ISBN 978-1-5386-8197-8
Publisher:
IEEE
DOI:
10.1109/FDTC.2018.00013
Author(s):
Grubbs, Paul; Lacharité, Marie-Sarah; Minaud, Brice; Paterson, Kenneth G.
Published in:
480-496, Issue 1, 2019
Publisher:
IEEE Symposium on Security and Privacy
DOI:
10.5281/zenodo.2594531
Author(s):
Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg
Published in:
Issue 1, 2018
Publisher:
USENIX Association
DOI:
10.5281/zenodo.2594631
Author(s):
Paul Grubbs, Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Published in:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 315-331, ISBN 9781-450356930
Publisher:
ACM Press
DOI:
10.1145/3243734.3243864
Author(s):
Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Published in:
2018 IEEE Symposium on Security and Privacy (SP), 2018, Page(s) 297-314, ISBN 978-1-5386-4353-2
Publisher:
IEEE
DOI:
10.1109/SP.2018.00002
Author(s):
Bos, Joppe W.; Friedberger, Simon
Published in:
Issue 1, 2017
Publisher:
IEEE
DOI:
10.5281/zenodo.2594671
Author(s):
Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
Published in:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 556-573, ISBN 9781-450356930
Publisher:
ACM Press
DOI:
10.1145/3243734.3243845
Author(s):
Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Published in:
Kalpa Publications in Computing volume 7, 2018, Page(s) 16--1
Publisher:
EasyChair
DOI:
10.29007/mbf3
Author(s):
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in:
CHES 2016, Lecture Notes in Computer Science, Issue 9813, 2016, Page(s) 171-193, ISBN 978-3-662-53140-2
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53140-2_9
Author(s):
Guido Bertoni, Marco Martinoli
Published in:
SPACE 2016, Lecture Notes in Computer Science, Issue 10076, 2016, Page(s) 363-382, ISBN 978-3-319-49445-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-49445-6_21
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available