Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Career Development Plan Y1 (se abrirá en una nueva ventana)

Preliminary Fellow Report Y1

Half way Review of Dissemination, Press and Outreach Strategy (se abrirá en una nueva ventana)

Intermediate Status of dissemination and outreach

Career Development Plan Y3 (se abrirá en una nueva ventana)

Preliminary Fellow Report Y3

Yearly report on training Y1 (se abrirá en una nueva ventana)

Written evaluation on training activities

Final Report on Dissemination, Press and Outreach Strategy (se abrirá en una nueva ventana)

Final status of dissemination and outreach activities

Technical Report on First designs for IoT and the Cloud (se abrirá en una nueva ventana)

First designs for IoT and the Cloud

Dissemination, Press and Outreach Strategy (se abrirá en una nueva ventana)

Strategy on dissemination and outreach

Final Career Development Plan Y4 (se abrirá en una nueva ventana)

Final Fellow Report Y4

Progress Report (se abrirá en una nueva ventana)

the Progress report M13 relates to the milestone on completion of the recruitment phase and includes general update on the project progress (technical implementation and management).

Tech report on Implementation results (se abrirá en una nueva ventana)
Yearly report on training Y3 (se abrirá en una nueva ventana)

Written evaluation on training activities

Awarding of doctoral degrees (se abrirá en una nueva ventana)

List of ESRs with doctoral degrees

Draft Periodic Report (se abrirá en una nueva ventana)

This report includes general update on the project progress (technical implementation and management) and is a preparatory document for the project review meeting.

Yearly report on training Y2 (se abrirá en una nueva ventana)

Written evaluation on training activities

Yearly report on training Y4 (se abrirá en una nueva ventana)

Written evaluation on training activities

Technical Report on Requirements and design constraints for IoT and Cloud (se abrirá en una nueva ventana)

Requirements and design constraints for IoT and Cloud

Career Development Plan Y2 (se abrirá en una nueva ventana)

Preliminary Fellow Report Y2

Technical report on Final designs and implementations (se abrirá en una nueva ventana)

Final designs and implementations

Overall Recruitment (se abrirá en una nueva ventana)

Recruitment of the ESRs by all beneficiaries

Supervisory Board of the network (se abrirá en una nueva ventana)

The Supervisory Board as the executive body of the ETN; The Supervisory Board (SB) will be responsible for the overall strategic and scientific management of the network and reports directly to the GA. The SB will be composed of the coordinator, the supervisors, the co-supervisors and external stakeholders from industry and government. The diversity of this board is intended to ensure ongoing relevance of the Network and that integration benefits from the expertise of all relevant parties. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions. The annual meetings of supervisory board, general assembly meeting and fellow council meeting will be co-located with network wide training events in order to keep travel overhead low. External stakeholders that will serve on the Supervisory Board include Claire Vishik (Intel), Moti Yung (Google), and Kaisa Nyberg (Aalto University); in addition a representative from ENISA (European Network and Information Security Agency) will be invited. The Supervisory Board oversees integration of the research goals within the project and provides advice on all strategic issues relevant to both scientific and administrative aspects. The Supervisory Board will fulfil other specific tasks including the initiation, coordination and organization of the workpackages and the support of the Coordinator in its tasks. It will also monitor and coordinate all planned trainings events within the ITN. The Supervisory Board will be responsible for adjusting the work plan if there are any disruptions such as the recruitment not going to according to a plan, or fellow leaving the network and so on. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions.

ESRs declarations (se abrirá en una nueva ventana)

Collecting all ESR declarations

Publicaciones

Faster SeaSign signatures through improved rejection sampling

Autores: Thomas Decru and Lorenz Panny and Frederik Vercauteren
Publicado en: PQCrypto 2019, 2019, Página(s) to appear
Editor: Springer

CSIDH: An Efficient Post-Quantum Commutative Group Action (se abrirá en una nueva ventana)

Autores: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Edición 11274, 2018, Página(s) 395-427, ISBN 978-3-030-03331-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03332-3_15

Low-Communication Parallel Quantum Multi-Target Preimage Search (se abrirá en una nueva ventana)

Autores: Gustavo Banegas, Daniel J. Bernstein
Publicado en: Selected Areas in Cryptography – SAC 2017, Edición 10719, 2018, Página(s) 325-335, ISBN 978-3-319-72564-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-72565-9_16

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction (se abrirá en una nueva ventana)

Autores: Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Publicado en: Progress in Cryptology – AFRICACRYPT 2018, Edición 10831, 2018, Página(s) 203-216, ISBN 978-3-319-89338-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-89339-6_12

Fast Homomorphic Evaluation of Deep Discretized Neural Networks (se abrirá en una nueva ventana)

Autores: Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Edición 10993, 2018, Página(s) 483-512, ISBN 978-3-319-96877-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_17

Assessing the Feasibility of Single Trace Power Analysis of Frodo (se abrirá en una nueva ventana)

Autores: Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Publicado en: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Edición 11349, 2019, Página(s) 216-234, ISBN 978-3-030-10969-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-10970-7_10

FHE Circuit Privacy Almost for Free (se abrirá en una nueva ventana)

Autores: Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Publicado en: Advances in Cryptology – CRYPTO 2016, Edición 9815, 2016, Página(s) 62-89, ISBN 978-3-662-53007-8
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53008-5_3

Foundational (Co)datatypes and (Co)recursion for Higher-Order Logic (se abrirá en una nueva ventana)

Autores: Julian Biendarra, Jasmin Christian Blanchette, Aymeric Bouzy, Martin Desharnais, Mathias Fleury, Johannes Hölzl, Ondřej Kunčar, Andreas Lochbihler, Fabian Meier, Lorenz Panny, Andrei Popescu, Christian Sternagel, René Thiemann, Dmitriy Traytel
Publicado en: Frontiers of Combining Systems, Edición 10483, 2017, Página(s) 3-21, ISBN 978-3-319-66166-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-66167-4_1

MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth (se abrirá en una nueva ventana)

Autores: Ralph Ankele, Florian Böhl, Simon Friedberger
Publicado en: Applied Cryptography and Network Security, Edición 10892, 2018, Página(s) 381-399, ISBN 978-3-319-93386-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_20

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis (se abrirá en una nueva ventana)

Autores: Ralph Ankele, Stefan Kölbl
Publicado en: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Edición 11349, 2019, Página(s) 163-190, ISBN 978-3-030-10969-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-10970-7_8

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) (se abrirá en una nueva ventana)

Autores: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Edición 11274, 2018, Página(s) 86-117, ISBN 978-3-030-03331-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03332-3_4

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (se abrirá en una nueva ventana)

Autores: Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Edición 10991, 2018, Página(s) 275-305, ISBN 978-3-319-96883-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_10

Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware (se abrirá en una nueva ventana)

Autores: Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
Publicado en: Progress in Cryptology – AFRICACRYPT 2016, Edición 9646, 2016, Página(s) 147-166, ISBN 978-3-319-31516-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-31517-1_8

Related-Key Impossible-Differential Attack on Reduced-Round Skinny (se abrirá en una nueva ventana)

Autores: Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
Publicado en: Applied Cryptography and Network Security, Edición 10355, 2017, Página(s) 208-228, ISBN 978-3-319-61203-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-61204-1_11

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer (se abrirá en una nueva ventana)

Autores: Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – ASIACRYPT 2017, Edición 10624, 2017, Página(s) 598-628, ISBN 978-3-319-70693-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70694-8_21

Robust Encryption, Extended (se abrirá en una nueva ventana)

Autores: Rémi Géraud, David Naccache, Răzvan Roşie
Publicado en: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Edición 11405, 2019, Página(s) 149-168, ISBN 978-3-030-12611-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-12612-4_8

More Efficient Constant-Round Multi-party Computation from BMR and SHE (se abrirá en una nueva ventana)

Autores: Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Publicado en: Theory of Cryptography, Edición 9985, 2016, Página(s) 554-581, ISBN 978-3-662-53640-7
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53641-4_21

Adaptive-Secure VRFs with Shorter Keys from Static Assumptions (se abrirá en una nueva ventana)

Autores: Răzvan Roşie
Publicado en: Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Edición 11124, 2018, Página(s) 440-459, ISBN 978-3-030-00433-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-00434-7_22

Twisting Lattice and Graph Techniques to Compress Transactional Ledgers (se abrirá en una nueva ventana)

Autores: Rémi Géraud, David Naccache, Răzvan Roşie
Publicado en: Security and Privacy in Communication Networks, Edición 238, 2018, Página(s) 108-127, ISBN 978-3-319-78812-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-78813-5_6

Differential Cryptanalysis of Round-Reduced Sparx-64/128 (se abrirá en una nueva ventana)

Autores: Ralph Ankele, Eik List
Publicado en: Applied Cryptography and Network Security, Edición 10892, 2018, Página(s) 459-475, ISBN 978-3-319-93386-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_24

Faster Secure Multi-party Computation of AES and DES Using Lookup Tables (se abrirá en una nueva ventana)

Autores: Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
Publicado en: Applied Cryptography and Network Security, Edición 10355, 2017, Página(s) 229-249, ISBN 978-3-319-61203-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-61204-1_12

TinyKeys: A New Approach to Efficient Multi-Party Computation (se abrirá en una nueva ventana)

Autores: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Edición 10993, 2018, Página(s) 3-33, ISBN 978-3-319-96877-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_1

Designing Efficient Dyadic Operations for Cryptographic Applications

Autores: Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
Publicado en: Journal of Mathematical Cryptology, Edición to appear, 2019, ISSN 1862-2976
Editor: Walter de Gruyter GmbH & Co. KG

DAGS: Key encapsulation using dyadic GS codes (se abrirá en una nueva ventana)

Autores: Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Publicado en: Journal of Mathematical Cryptology, Edición 12/4, 2018, Página(s) 221-239, ISSN 1862-2976
Editor: Walter de Gruyter GmbH & Co. KG
DOI: 10.1515/jmc-2018-0027

A new class of irreducible pentanomials for polynomial-based multipliers in binary fields (se abrirá en una nueva ventana)

Autores: Gustavo Banegas, Ricardo Custódio, Daniel Panario
Publicado en: Journal of Cryptographic Engineering, 2019, ISSN 2190-8508
Editor: Springer Science + Business Media
DOI: 10.1007/s13389-018-0197-6

Arithmetic Considerations for Isogeny Based Cryptography (se abrirá en una nueva ventana)

Autores: Joppe Bos, Simon Friedberger
Publicado en: IEEE Transactions on Computers, 2018, Página(s) 1-1, ISSN 0018-9340
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TC.2018.2851238

New classes of complete permutation polynomials (se abrirá en una nueva ventana)

Autores: Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng
Publicado en: Finite Fields and Their Applications, Edición 55, 2019, Página(s) 177-201, ISSN 1071-5797
Editor: Academic Press
DOI: 10.1016/j.ffa.2018.10.001

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion (se abrirá en una nueva ventana)

Autores: Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke
Publicado en: IACR Transactions on Symmetric Cryptology 1–43, Edición 1, 2019, ISSN 2519-173X
Editor: IACR
DOI: 10.5281/zenodo.2593578

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data (se abrirá en una nueva ventana)

Autores: Lacharité, M.-S; Paterson, K.
Publicado en: IACR Transactions on Symmetric Cryptology 2018(1) 277-313, Edición 1, 2018, ISSN 2519-173X
Editor: IACR
DOI: 10.13154/tosc.v2018.i1.277-313

Binary sequences with period N and nonlinear complexity N − 2 (se abrirá en una nueva ventana)

Autores: Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang
Publicado en: Cryptography and Communications, 2018, ISSN 1936-2447
Editor: Springer Pub. Co.,
DOI: 10.1007/s12095-018-0324-3

A Methodology for the Characterisation of Leakages in Combinatorial Logic (se abrirá en una nueva ventana)

Autores: Guido Bertoni, Marco Martinoli, Maria Chiara Molteni
Publicado en: Journal of Hardware and Systems Security, Edición 1/3, 2017, Página(s) 269-281, ISSN 2509-3428
Editor: Springer
DOI: 10.1007/s41635-017-0015-0

Impossible Meet-in-the-middle Fault Analysis on the LED Lightweight Cipher in VANETs (se abrirá en una nueva ventana)

Autores: Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Publicado en: SCIENCE CHINA Information Sciences, Edición 1, 2018, ISSN 1869-1919
Editor: Springer
DOI: 10.5281/zenodo.2593621

Security of BLS and BGLS signatures in a multi-user setting (se abrirá en una nueva ventana)

Autores: Marie-Sarah Lacharité
Publicado en: Cryptography and Communications, Edición 10/1, 2018, Página(s) 41-58, ISSN 1936-2447
Editor: Springer Pub. Co.,
DOI: 10.1007/s12095-017-0253-6

Permutation polynomials (x pm − x + δ) s1 + (x pm − x + δ) s2 + x over Fp n (se abrirá en una nueva ventana)

Autores: Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong
Publicado en: Finite Fields and Their Applications 51(May 2018) 31-61, Edición 1, 2018, ISSN 1071-5797
Editor: Academic Press
DOI: 10.5281/zenodo.2594493

Strong 8-bit Sboxes with efficient masking in hardware extended version (se abrirá en una nueva ventana)

Autores: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Publicado en: Journal of Cryptographic Engineering, Edición 7/2, 2017, Página(s) 149-165, ISSN 2190-8508
Editor: Springer Science + Business Media
DOI: 10.1007/s13389-017-0156-7

Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things (se abrirá en una nueva ventana)

Autores: Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
Publicado en: IEEE Transactions on Dependable and Secure Computing, 2018, Página(s) 1-1, ISSN 1545-5971
Editor: IEEE Computer Society
DOI: 10.1109/TDSC.2018.2857770

Security of Symmetric Primitives under Incorrect Usage of Keys (se abrirá en una nueva ventana)

Autores: Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan
Publicado en: IACR Transactions on Symmetric Cryptology, Edición 1, 2017, Página(s) 449-473, ISSN 2519-173X
Editor: Ruhr University of Bochum
DOI: 10.13154/tosc.v2017.i1.449-473

Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices (se abrirá en una nueva ventana)

Autores: Chaoyun Li and Qingju Wang
Publicado en: IACR Transactions on Symmetric Cryptology, Edición 1, 2017, Página(s) 129-155, ISSN 2519-173X
Editor: Ruhr University of Bochum
DOI: 10.13154/tosc.v2017.i1.129-155

A Note of 5-bit Quadratic Permutations' Classification (se abrirá en una nueva ventana)

Autores: Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
Publicado en: IACR Transactions on Symmetric Cryptology, Edición 1, 2017, Página(s) 398-404, ISSN 2519-173X
Editor: Ruhr University of Bochum
DOI: 10.13154/tosc.v2017.i1.398-404

Processing Encrypted Data Using Homomorphic Encryption (se abrirá en una nueva ventana)

Autores: Barnett, Anthony; Bonte, Charlotte; Bootland, Carl; Bos, Joppe W.; Castryck, Wouter; Costache, Anamaria; Goubin, Louis; Iliashenko, Ilia; Lepoint, Tancrède; Minelli, Michele; Paillier, Pascal; Smart, Nigel P.; Vercauteren, Frederik; Vivek, Srinivas; Waller, Adrian
Publicado en: Edición 1, 2017
Editor: Workshop on Data Mining with Secure Computation
DOI: 10.5281/zenodo.2594695

Glitch-Resistant Masking Schemes as Countermeasure Against Fault Sensitivity Analysis (se abrirá en una nueva ventana)

Autores: Victor Arribas, Thomas De Cnudde, Danilo Sijacic
Publicado en: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018, Página(s) 27-34, ISBN 978-1-5386-8197-8
Editor: IEEE
DOI: 10.1109/FDTC.2018.00013

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks (se abrirá en una nueva ventana)

Autores: Grubbs, Paul; Lacharité, Marie-Sarah; Minaud, Brice; Paterson, Kenneth G.
Publicado en: 480-496, Edición 1, 2019
Editor: IEEE Symposium on Security and Privacy
DOI: 10.5281/zenodo.2594531

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (se abrirá en una nueva ventana)

Autores: Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg
Publicado en: Edición 1, 2018
Editor: USENIX Association
DOI: 10.5281/zenodo.2594631

Pump up the Volume - Practical Database Reconstruction from Volume Leakage on Range Queries (se abrirá en una nueva ventana)

Autores: Paul Grubbs, Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Publicado en: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Página(s) 315-331, ISBN 9781-450356930
Editor: ACM Press
DOI: 10.1145/3243734.3243864

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage (se abrirá en una nueva ventana)

Autores: Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Publicado en: 2018 IEEE Symposium on Security and Privacy (SP), 2018, Página(s) 297-314, ISBN 978-1-5386-4353-2
Editor: IEEE
DOI: 10.1109/SP.2018.00002

Fast Arithmetic Modulo 2xpy±1 (se abrirá en una nueva ventana)

Autores: Bos, Joppe W.; Friedberger, Simon
Publicado en: Edición 1, 2017
Editor: IEEE
DOI: 10.5281/zenodo.2594671

Lattice-Based zk-SNARKs from Square Span Programs (se abrirá en una nueva ventana)

Autores: Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
Publicado en: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Página(s) 556-573, ISBN 9781-450356930
Editor: ACM Press
DOI: 10.1145/3243734.3243845

Towards Efficient and Automated Side Channel Evaluations at Design Time (se abrirá en una nueva ventana)

Autores: Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Publicado en: Kalpa Publications in Computing volume 7, 2018, Página(s) 16--1
Editor: EasyChair
DOI: 10.29007/mbf3

Strong 8-bit Sboxes with Efficient Masking in Hardware (se abrirá en una nueva ventana)

Autores: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Publicado en: CHES 2016, Lecture Notes in Computer Science, Edición 9813, 2016, Página(s) 171-193, ISBN 978-3-662-53140-2
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53140-2_9

A Methodology for the Characterisation of Leakages in Combinatorial Logic (se abrirá en una nueva ventana)

Autores: Guido Bertoni, Marco Martinoli
Publicado en: SPACE 2016, Lecture Notes in Computer Science, Edición 10076, 2016, Página(s) 363-382, ISBN 978-3-319-49445-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-49445-6_21

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0