Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

European Coordination and Support Action in Cryptology

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Workshop on Evaluation of symmetric standards (opens in new window)
Workshop on Tools for asymmetric cryptanalysis (opens in new window)
Workshop on Post-Snowden crypto for the Internet (opens in new window)
Workshop on Computing on Encrypted Data (opens in new window)
School on post-quantum cryptography (opens in new window)
Workshop on Hardware benchmarking (opens in new window)
Workshop on Authenticated encryption (opens in new window)
Workshop on Tools for Security Modelling and Proofs (opens in new window)
Workshop on Post-quantum cryptography (including lattices) (opens in new window)
Workshop on Cryptocurrencies (opens in new window)
Workshop on Cryptographic protocols with complex functionalities (opens in new window)
Workshop on Ultra low energy/power cryptography (opens in new window)
School on cryptographic modelling (opens in new window)
Workshop on Software benchmarking (opens in new window)
School on societal aspects of cryptology and on business and innovation in cryptology (opens in new window)
Workshop in Internet of Things (opens in new window)
Workshop on Privacy Enhancing Technologies (opens in new window)
Workshop on Random Number Generation (opens in new window)
Workshop on Cryptographic protocols for small devices (opens in new window)
Workshop on Symmetric cryptography designed for side channel and fault resistance (opens in new window)
Workshop on Security evaluation of implementations (opens in new window)
Workshop on Cryptographic standards and evaluations (opens in new window)
Workshop on Multilinear Maps and Obfuscation (opens in new window)
School on symmetric cryptography: design, cryptanalysis and implementations (opens in new window)

School on symmetric cryptography design cryptanalysis and implementations

Publications

Strong 8-bit Sboxes with Efficient Masking in Hardware (opens in new window)

Author(s): Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 171-193, ISBN 978-3-662-53140-2
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53140-2_9

Tightly CCA-Secure Encryption Without Pairings (opens in new window)

Author(s): Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
Published in: Advances in Cryptology – EUROCRYPT 2016, 2016, Page(s) 1-27, ISBN 978-3-662-49890-3
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49890-3_1

Threshold FlipThem: When the Winner Does Not Need to Take All (opens in new window)

Author(s): David Leslie, Chris Sherfield, Nigel P. Smart
Published in: Decision and Game Theory for Security, 2015, Page(s) 74-92, ISBN 978-3-319-25594-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-25594-1_5

Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing (opens in new window)

Author(s): Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Published in: Security and Cryptography for Networks, 2016, Page(s) 147-168, ISBN 978-3-319-44618-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_8

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? (opens in new window)

Author(s): Ana Costache, Nigel P. Smart
Published in: Topics in Cryptology - CT-RSA 2016, 2016, Page(s) 325-340, ISBN 978-3-319-29485-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-29485-8_19

Forgery and Subkey Recovery on CAESAR Candidate iFeed (opens in new window)

Author(s): Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel
Published in: Selected Areas in Cryptography – SAC 2015, 2016, Page(s) 197-204, ISBN 978-3-319-31301-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-31301-6_11

Efficient Constant Round Multi-party Computation Combining BMR and SPDZ (opens in new window)

Author(s): Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Published in: Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 319-338, ISBN 978-3-662-48000-7
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48000-7_16

On the Hardness of Learning with Rounding over Small Modulus (opens in new window)

Author(s): Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
Published in: Theory of Cryptography, 2016, Page(s) 209-224, ISBN 978-3-662-49096-9
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49096-9_9

Structure-Preserving Signatures from Standard Assumptions, Revisited (opens in new window)

Author(s): Eike Kiltz, Jiaxin Pan, Hoeteck Wee
Published in: Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 275-295, ISBN 978-3-662-48000-7
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48000-7_14

Optimal Security Proofs for Signatures from Identification Schemes (opens in new window)

Author(s): Eike Kiltz, Daniel Masny, Jiaxin Pan
Published in: Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 33-61, ISBN 978-3-662-53008-5
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53008-5_2

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks (opens in new window)

Author(s): Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Published in: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 625-647, ISBN 978-3-662-53140-2
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53140-2_30

On the Impact of Known-Key Attacks on Hash Functions (opens in new window)

Author(s): Bart Mennink, Bart Preneel
Published in: Advances in Cryptology – ASIACRYPT 2015, 2015, Page(s) 59-84, ISBN 978-3-662-48800-3
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48800-3_3

Two-Round Man-in-the-Middle Security from LPN (opens in new window)

Author(s): David Cash, Eike Kiltz, Stefano Tessaro
Published in: Theory of Cryptography, 2016, Page(s) 225-248, ISBN 978-3-662-49096-9
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49096-9_10

How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to (opens in new window)

Author(s): Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
Published in: Security Standardisation Research, 2015, Page(s) 109-139, ISBN 978-3-319-27152-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-27152-1_6

Twisted Hessian Curves (opens in new window)

Author(s): Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
Published in: Progress in Cryptology -- LATINCRYPT 2015, 2015, Page(s) 269-294, ISBN 978-3-319-22174-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-22174-8_15

Consolidating Masking Schemes (opens in new window)

Author(s): Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 764-783, ISBN 978-3-662-47989-6
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-47989-6_37

Failures in NIST's ECC standards

Author(s): Daniel J. Bernstein, Tanja Lange
Published in: NIST, 2015
Publisher: NIST

Faster elliptic-curve discrete logarithms on FP- GAs

Author(s): Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
Published in: eprint, 2016
Publisher: eprint

"""NTRU Prime."" "

Author(s): Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vreden- daal
Published in: eprint, 2016
Publisher: eprint

Anonymous Split E-Cash—Toward Mobile Anonymous Payments (opens in new window)

Author(s): Marijn Scheir, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede
Published in: ACM Transactions on Embedded Computing Systems, Issue 14/4, 2015, Page(s) 1-25, ISSN 1539-9087
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/2783439

Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis (opens in new window)

Author(s): Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
Published in: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Issue 34/6, 2015, Page(s) 889-902, ISSN 0278-0070
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TCAD.2014.2370531

Two-permutation-based hashing with binary mixing (opens in new window)

Author(s): Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen
Published in: Journal of Mathematical Cryptology, Issue 9/3, 2015, ISSN 1862-2976
Publisher: Walter de Gruyter GmbH & Co. KG
DOI: 10.1515/jmc-2015-0015

Open problems in hash function security (opens in new window)

Author(s): Elena Andreeva, Bart Mennink, Bart Preneel
Published in: Designs, Codes and Cryptography, Issue 77/2-3, 2015, Page(s) 611-631, ISSN 0925-1022
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10623-015-0096-0

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0