Deliverables
Workshop on Tools for asymmetric cryptanalysis
Workshop on Post-Snowden crypto for the Internet
Workshop on Computing on Encrypted Data
School on post-quantum cryptography
Workshop on Hardware benchmarking
Workshop on Authenticated encryption
Workshop on Tools for Security Modelling and Proofs
Workshop on Post-quantum cryptography (including lattices)
Workshop on Cryptocurrencies
Workshop on Cryptographic protocols with complex functionalities
Workshop on Ultra low energy/power cryptography
School on cryptographic modelling
Workshop on Software benchmarking
School on societal aspects of cryptology and on business and innovation in cryptology
Workshop in Internet of Things
Workshop on Privacy Enhancing Technologies
Workshop on Random Number Generation
Workshop on Cryptographic protocols for small devices
Workshop on Symmetric cryptography designed for side channel and fault resistance
Workshop on Security evaluation of implementations
Workshop on Cryptographic standards and evaluations
Workshop on Multilinear Maps and Obfuscation
School on symmetric cryptography: design, cryptanalysis and implementations
School on symmetric cryptography design cryptanalysis and implementations
Final Report on hot topics (technology driven)
Report on application areas (application driven) RP1
Periodic Management Report RP1
Final Management Report
Report on hot topics (technology driven) RP1
Intermediate Research agenda and foresight study
Report on standardisation RP1
Final Dissemination Plan
Final Report on application areas (application driven)
Final Research agenda and foresight study
Intermediate Dissemination Plan
Final Report on standardisation
Key length and algorithm consultation rep
Key length and algorithm consultation report
Final Key length and algorithm consultation reportFinal Communication Plan
Publications
Author(s):
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in:
Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 171-193, ISBN 978-3-662-53140-2
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53140-2_9
Author(s):
Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
Published in:
Advances in Cryptology – EUROCRYPT 2016, 2016, Page(s) 1-27, ISBN 978-3-662-49890-3
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49890-3_1
Author(s):
David Leslie, Chris Sherfield, Nigel P. Smart
Published in:
Decision and Game Theory for Security, 2015, Page(s) 74-92, ISBN 978-3-319-25594-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-25594-1_5
Author(s):
Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Published in:
Security and Cryptography for Networks, 2016, Page(s) 147-168, ISBN 978-3-319-44618-9
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-44618-9_8
Author(s):
Ana Costache, Nigel P. Smart
Published in:
Topics in Cryptology - CT-RSA 2016, 2016, Page(s) 325-340, ISBN 978-3-319-29485-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29485-8_19
Author(s):
Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel
Published in:
Selected Areas in Cryptography – SAC 2015, 2016, Page(s) 197-204, ISBN 978-3-319-31301-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31301-6_11
Author(s):
Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Published in:
Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 319-338, ISBN 978-3-662-48000-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48000-7_16
Author(s):
Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
Published in:
Theory of Cryptography, 2016, Page(s) 209-224, ISBN 978-3-662-49096-9
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49096-9_9
Author(s):
Eike Kiltz, Jiaxin Pan, Hoeteck Wee
Published in:
Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 275-295, ISBN 978-3-662-48000-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48000-7_14
Author(s):
Eike Kiltz, Daniel Masny, Jiaxin Pan
Published in:
Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 33-61, ISBN 978-3-662-53008-5
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53008-5_2
Author(s):
Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Published in:
Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 625-647, ISBN 978-3-662-53140-2
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53140-2_30
Author(s):
Bart Mennink, Bart Preneel
Published in:
Advances in Cryptology – ASIACRYPT 2015, 2015, Page(s) 59-84, ISBN 978-3-662-48800-3
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48800-3_3
Author(s):
David Cash, Eike Kiltz, Stefano Tessaro
Published in:
Theory of Cryptography, 2016, Page(s) 225-248, ISBN 978-3-662-49096-9
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49096-9_10
Author(s):
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
Published in:
Security Standardisation Research, 2015, Page(s) 109-139, ISBN 978-3-319-27152-1
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-27152-1_6
Author(s):
Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
Published in:
Progress in Cryptology -- LATINCRYPT 2015, 2015, Page(s) 269-294, ISBN 978-3-319-22174-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-22174-8_15
Author(s):
Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
Published in:
Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 764-783, ISBN 978-3-662-47989-6
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-47989-6_37
Author(s):
Daniel J. Bernstein, Tanja Lange
Published in:
NIST, 2015
Publisher:
NIST
Author(s):
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar,
Peter Schwabe, Ralf Zimmermann
Published in:
eprint, 2016
Publisher:
eprint
Author(s):
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vreden-
daal
Published in:
eprint, 2016
Publisher:
eprint
Author(s):
Marijn Scheir, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede
Published in:
ACM Transactions on Embedded Computing Systems, Issue 14/4, 2015, Page(s) 1-25, ISSN 1539-9087
Publisher:
Association for Computing Machinary, Inc.
DOI:
10.1145/2783439
Author(s):
Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
Published in:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Issue 34/6, 2015, Page(s) 889-902, ISSN 0278-0070
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TCAD.2014.2370531
Author(s):
Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen
Published in:
Journal of Mathematical Cryptology, Issue 9/3, 2015, ISSN 1862-2976
Publisher:
Walter de Gruyter GmbH & Co. KG
DOI:
10.1515/jmc-2015-0015
Author(s):
Elena Andreeva, Bart Mennink, Bart Preneel
Published in:
Designs, Codes and Cryptography, Issue 77/2-3, 2015, Page(s) 611-631, ISSN 0925-1022
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s10623-015-0096-0
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available