Risultati finali Documents, reports (18) Career Development Plan Y1 Preliminary Fellow Report Y1 Half way Review of Dissemination, Press and Outreach Strategy Intermediate Status of dissemination and outreach Career Development Plan Y3 Preliminary Fellow Report Y3 Yearly report on training Y1 Written evaluation on training activities Final Report on Dissemination, Press and Outreach Strategy Final status of dissemination and outreach activities Technical Report on First designs for IoT and the Cloud First designs for IoT and the Cloud Dissemination, Press and Outreach Strategy Strategy on dissemination and outreach Final Career Development Plan Y4 Final Fellow Report Y4 Progress Report the Progress report M13 relates to the milestone on completion of the recruitment phase and includes general update on the project progress (technical implementation and management). Tech report on Implementation results Yearly report on training Y3 Written evaluation on training activities Awarding of doctoral degrees List of ESRs with doctoral degrees Draft Periodic Report This report includes general update on the project progress (technical implementation and management) and is a preparatory document for the project review meeting. Yearly report on training Y2 Written evaluation on training activities Yearly report on training Y4 Written evaluation on training activities Technical Report on Requirements and design constraints for IoT and Cloud Requirements and design constraints for IoT and Cloud Career Development Plan Y2 Preliminary Fellow Report Y2 Technical report on Final designs and implementations Final designs and implementations Other (3) Overall Recruitment Recruitment of the ESRs by all beneficiaries Supervisory Board of the network The Supervisory Board as the executive body of the ETN; The Supervisory Board (SB) will be responsible for the overall strategic and scientific management of the network and reports directly to the GA. The SB will be composed of the coordinator, the supervisors, the co-supervisors and external stakeholders from industry and government. The diversity of this board is intended to ensure ongoing relevance of the Network and that integration benefits from the expertise of all relevant parties. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions. The annual meetings of supervisory board, general assembly meeting and fellow council meeting will be co-located with network wide training events in order to keep travel overhead low. External stakeholders that will serve on the Supervisory Board include Claire Vishik (Intel), Moti Yung (Google), and Kaisa Nyberg (Aalto University); in addition a representative from ENISA (European Network and Information Security Agency) will be invited. The Supervisory Board oversees integration of the research goals within the project and provides advice on all strategic issues relevant to both scientific and administrative aspects. The Supervisory Board will fulfil other specific tasks including the initiation, coordination and organization of the workpackages and the support of the Coordinator in its tasks. It will also monitor and coordinate all planned trainings events within the ITN. The Supervisory Board will be responsible for adjusting the work plan if there are any disruptions such as the recruitment not going to according to a plan, or fellow leaving the network and so on. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions. ESRs declarations Collecting all ESR declarations Websites, patent fillings, videos etc. (1) Network public website Pubblicazioni Book chapters (22) Faster SeaSign signatures through improved rejection sampling Autori: Thomas Decru and Lorenz Panny and Frederik Vercauteren Pubblicato in: PQCrypto 2019, 2019, Page(s) to appear Editore: Springer CSIDH: An Efficient Post-Quantum Commutative Group Action Autori: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes Pubblicato in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 395-427, ISBN 978-3-030-03331-6 Editore: Springer International Publishing DOI: 10.1007/978-3-030-03332-3_15 Low-Communication Parallel Quantum Multi-Target Preimage Search Autori: Gustavo Banegas, Daniel J. Bernstein Pubblicato in: Selected Areas in Cryptography – SAC 2017, Issue 10719, 2018, Page(s) 325-335, ISBN 978-3-319-72564-2 Editore: Springer International Publishing DOI: 10.1007/978-3-319-72565-9_16 HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction Autori: Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny Pubblicato in: Progress in Cryptology – AFRICACRYPT 2018, Issue 10831, 2018, Page(s) 203-216, ISBN 978-3-319-89338-9 Editore: Springer International Publishing DOI: 10.1007/978-3-319-89339-6_12 Fast Homomorphic Evaluation of Deep Discretized Neural Networks Autori: Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier Pubblicato in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 483-512, ISBN 978-3-319-96877-3 Editore: Springer International Publishing DOI: 10.1007/978-3-319-96878-0_17 Assessing the Feasibility of Single Trace Power Analysis of Frodo Autori: Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam Pubblicato in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 216-234, ISBN 978-3-030-10969-1 Editore: Springer International Publishing DOI: 10.1007/978-3-030-10970-7_10 FHE Circuit Privacy Almost for Free Autori: Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee Pubblicato in: Advances in Cryptology – CRYPTO 2016, Issue 9815, 2016, Page(s) 62-89, ISBN 978-3-662-53007-8 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53008-5_3 Foundational (Co)datatypes and (Co)recursion for Higher-Order Logic Autori: Julian Biendarra, Jasmin Christian Blanchette, Aymeric Bouzy, Martin Desharnais, Mathias Fleury, Johannes Hölzl, Ondřej Kunčar, Andreas Lochbihler, Fabian Meier, Lorenz Panny, Andrei Popescu, Christian Sternagel, René Thiemann, Dmitriy Traytel Pubblicato in: Frontiers of Combining Systems, Issue 10483, 2017, Page(s) 3-21, ISBN 978-3-319-66166-7 Editore: Springer International Publishing DOI: 10.1007/978-3-319-66167-4_1 MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth Autori: Ralph Ankele, Florian Böhl, Simon Friedberger Pubblicato in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 381-399, ISBN 978-3-319-93386-3 Editore: Springer International Publishing DOI: 10.1007/978-3-319-93387-0_20 Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis Autori: Ralph Ankele, Stefan Kölbl Pubblicato in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 163-190, ISBN 978-3-030-10969-1 Editore: Springer International Publishing DOI: 10.1007/978-3-030-10970-7_8 Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Autori: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez Pubblicato in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117, ISBN 978-3-030-03331-6 Editore: Springer International Publishing DOI: 10.1007/978-3-030-03332-3_4 Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly Autori: Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier Pubblicato in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 275-305, ISBN 978-3-319-96883-4 Editore: Springer International Publishing DOI: 10.1007/978-3-319-96884-1_10 Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware Autori: Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens Pubblicato in: Progress in Cryptology – AFRICACRYPT 2016, Issue 9646, 2016, Page(s) 147-166, ISBN 978-3-319-31516-4 Editore: Springer International Publishing DOI: 10.1007/978-3-319-31517-1_8 Related-Key Impossible-Differential Attack on Reduced-Round Skinny Autori: Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang Pubblicato in: Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 208-228, ISBN 978-3-319-61203-4 Editore: Springer International Publishing DOI: 10.1007/978-3-319-61204-1_11 Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Autori: Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez Pubblicato in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 598-628, ISBN 978-3-319-70693-1 Editore: Springer International Publishing DOI: 10.1007/978-3-319-70694-8_21 Robust Encryption, Extended Autori: Rémi Géraud, David Naccache, Răzvan Roşie Pubblicato in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 149-168, ISBN 978-3-030-12611-7 Editore: Springer International Publishing DOI: 10.1007/978-3-030-12612-4_8 More Efficient Constant-Round Multi-party Computation from BMR and SHE Autori: Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez Pubblicato in: Theory of Cryptography, Issue 9985, 2016, Page(s) 554-581, ISBN 978-3-662-53640-7 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53641-4_21 Adaptive-Secure VRFs with Shorter Keys from Static Assumptions Autori: Răzvan Roşie Pubblicato in: Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Issue 11124, 2018, Page(s) 440-459, ISBN 978-3-030-00433-0 Editore: Springer International Publishing DOI: 10.1007/978-3-030-00434-7_22 Twisting Lattice and Graph Techniques to Compress Transactional Ledgers Autori: Rémi Géraud, David Naccache, Răzvan Roşie Pubblicato in: Security and Privacy in Communication Networks, Issue 238, 2018, Page(s) 108-127, ISBN 978-3-319-78812-8 Editore: Springer International Publishing DOI: 10.1007/978-3-319-78813-5_6 Differential Cryptanalysis of Round-Reduced Sparx-64/128 Autori: Ralph Ankele, Eik List Pubblicato in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 459-475, ISBN 978-3-319-93386-3 Editore: Springer International Publishing DOI: 10.1007/978-3-319-93387-0_24 Faster Secure Multi-party Computation of AES and DES Using Lookup Tables Autori: Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek Pubblicato in: Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 229-249, ISBN 978-3-319-61203-4 Editore: Springer International Publishing DOI: 10.1007/978-3-319-61204-1_12 TinyKeys: A New Approach to Efficient Multi-Party Computation Autori: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez Pubblicato in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33, ISBN 978-3-319-96877-3 Editore: Springer International Publishing DOI: 10.1007/978-3-319-96878-0_1 Peer reviewed articles (17) Designing Efficient Dyadic Operations for Cryptographic Applications Autori: Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini Pubblicato in: Journal of Mathematical Cryptology, Issue to appear, 2019, ISSN 1862-2976 Editore: Walter de Gruyter GmbH & Co. KG DAGS: Key encapsulation using dyadic GS codes Autori: Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini Pubblicato in: Journal of Mathematical Cryptology, Issue 12/4, 2018, Page(s) 221-239, ISSN 1862-2976 Editore: Walter de Gruyter GmbH & Co. KG DOI: 10.1515/jmc-2018-0027 A new class of irreducible pentanomials for polynomial-based multipliers in binary fields Autori: Gustavo Banegas, Ricardo Custódio, Daniel Panario Pubblicato in: Journal of Cryptographic Engineering, 2019, ISSN 2190-8508 Editore: Springer Science + Business Media DOI: 10.1007/s13389-018-0197-6 Arithmetic Considerations for Isogeny Based Cryptography Autori: Joppe Bos, Simon Friedberger Pubblicato in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340 Editore: Institute of Electrical and Electronics Engineers DOI: 10.1109/TC.2018.2851238 New classes of complete permutation polynomials Autori: Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng Pubblicato in: Finite Fields and Their Applications, Issue 55, 2019, Page(s) 177-201, ISSN 1071-5797 Editore: Academic Press DOI: 10.1016/j.ffa.2018.10.001 Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion Autori: Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke Pubblicato in: IACR Transactions on Symmetric Cryptology 1–43, Issue 1, 2019, ISSN 2519-173X Editore: IACR DOI: 10.5281/zenodo.2593578 Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data Autori: Lacharité, M.-S; Paterson, K. Pubblicato in: IACR Transactions on Symmetric Cryptology 2018(1) 277-313, Issue 1, 2018, ISSN 2519-173X Editore: IACR DOI: 10.13154/tosc.v2018.i1.277-313 Binary sequences with period N and nonlinear complexity N − 2 Autori: Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang Pubblicato in: Cryptography and Communications, 2018, ISSN 1936-2447 Editore: Springer Pub. Co., DOI: 10.1007/s12095-018-0324-3 A Methodology for the Characterisation of Leakages in Combinatorial Logic Autori: Guido Bertoni, Marco Martinoli, Maria Chiara Molteni Pubblicato in: Journal of Hardware and Systems Security, Issue 1/3, 2017, Page(s) 269-281, ISSN 2509-3428 Editore: Springer DOI: 10.1007/s41635-017-0015-0 Impossible Meet-in-the-middle Fault Analysis on the LED Lightweight Cipher in VANETs Autori: Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya Pubblicato in: SCIENCE CHINA Information Sciences, Issue 1, 2018, ISSN 1869-1919 Editore: Springer DOI: 10.5281/zenodo.2593621 Security of BLS and BGLS signatures in a multi-user setting Autori: Marie-Sarah Lacharité Pubblicato in: Cryptography and Communications, Issue 10/1, 2018, Page(s) 41-58, ISSN 1936-2447 Editore: Springer Pub. Co., DOI: 10.1007/s12095-017-0253-6 Permutation polynomials (x pm − x + δ) s1 + (x pm − x + δ) s2 + x over Fp n Autori: Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong Pubblicato in: Finite Fields and Their Applications 51(May 2018) 31-61, Issue 1, 2018, ISSN 1071-5797 Editore: Academic Press DOI: 10.5281/zenodo.2594493 Strong 8-bit Sboxes with efficient masking in hardware extended version Autori: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider Pubblicato in: Journal of Cryptographic Engineering, Issue 7/2, 2017, Page(s) 149-165, ISSN 2190-8508 Editore: Springer Science + Business Media DOI: 10.1007/s13389-017-0156-7 Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things Autori: Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu Pubblicato in: IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971 Editore: IEEE Computer Society DOI: 10.1109/TDSC.2018.2857770 Security of Symmetric Primitives under Incorrect Usage of Keys Autori: Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan Pubblicato in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 449-473, ISSN 2519-173X Editore: Ruhr University of Bochum DOI: 10.13154/tosc.v2017.i1.449-473 Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices Autori: Chaoyun Li and Qingju Wang Pubblicato in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 129-155, ISSN 2519-173X Editore: Ruhr University of Bochum DOI: 10.13154/tosc.v2017.i1.129-155 A Note of 5-bit Quadratic Permutations' Classification Autori: Dušan Božilov, Begül Bilgin, Hacı Ali Sahin Pubblicato in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 398-404, ISSN 2519-173X Editore: Ruhr University of Bochum DOI: 10.13154/tosc.v2017.i1.398-404 Conference proceedings (11) Processing Encrypted Data Using Homomorphic Encryption Autori: Barnett, Anthony; Bonte, Charlotte; Bootland, Carl; Bos, Joppe W.; Castryck, Wouter; Costache, Anamaria; Goubin, Louis; Iliashenko, Ilia; Lepoint, Tancrède; Minelli, Michele; Paillier, Pascal; Smart, Nigel P.; Vercauteren, Frederik; Vivek, Srinivas; Waller, Adrian Pubblicato in: Issue 1, 2017 Editore: Workshop on Data Mining with Secure Computation DOI: 10.5281/zenodo.2594695 Glitch-Resistant Masking Schemes as Countermeasure Against Fault Sensitivity Analysis Autori: Victor Arribas, Thomas De Cnudde, Danilo Sijacic Pubblicato in: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018, Page(s) 27-34, ISBN 978-1-5386-8197-8 Editore: IEEE DOI: 10.1109/FDTC.2018.00013 Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks Autori: Grubbs, Paul; Lacharité, Marie-Sarah; Minaud, Brice; Paterson, Kenneth G. Pubblicato in: 480-496, Issue 1, 2019 Editore: IEEE Symposium on Security and Privacy DOI: 10.5281/zenodo.2594531 Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Autori: Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg Pubblicato in: Issue 1, 2018 Editore: USENIX Association DOI: 10.5281/zenodo.2594631 Pump up the Volume - Practical Database Reconstruction from Volume Leakage on Range Queries Autori: Paul Grubbs, Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson Pubblicato in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 315-331, ISBN 9781-450356930 Editore: ACM Press DOI: 10.1145/3243734.3243864 Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Autori: Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson Pubblicato in: 2018 IEEE Symposium on Security and Privacy (SP), 2018, Page(s) 297-314, ISBN 978-1-5386-4353-2 Editore: IEEE DOI: 10.1109/SP.2018.00002 Fast Arithmetic Modulo 2xpy±1 Autori: Bos, Joppe W.; Friedberger, Simon Pubblicato in: Issue 1, 2017 Editore: IEEE DOI: 10.5281/zenodo.2594671 Lattice-Based zk-SNARKs from Square Span Programs Autori: Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù Pubblicato in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 556-573, ISBN 9781-450356930 Editore: ACM Press DOI: 10.1145/3243734.3243845 Towards Efficient and Automated Side Channel Evaluations at Design Time Autori: Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede Pubblicato in: Kalpa Publications in Computing volume 7, 2018, Page(s) 16--1 Editore: EasyChair DOI: 10.29007/mbf3 Strong 8-bit Sboxes with Efficient Masking in Hardware Autori: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider Pubblicato in: CHES 2016, Lecture Notes in Computer Science, Issue 9813, 2016, Page(s) 171-193, ISBN 978-3-662-53140-2 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53140-2_9 A Methodology for the Characterisation of Leakages in Combinatorial Logic Autori: Guido Bertoni, Marco Martinoli Pubblicato in: SPACE 2016, Lecture Notes in Computer Science, Issue 10076, 2016, Page(s) 363-382, ISBN 978-3-319-49445-6 Editore: Springer International Publishing DOI: 10.1007/978-3-319-49445-6_21 È in corso la ricerca di dati su OpenAIRE... Si è verificato un errore durante la ricerca dei dati su OpenAIRE Nessun risultato disponibile