default search action
23rd SAC 2016: St. John's, NL, Canada
- Roberto Avanzi, Howard M. Heys:
Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10532, Springer 2017, ISBN 978-3-319-69452-8
Invited Lectures
- Francesco Regazzoni:
Physical Attacks and Beyond. 3-13 - Douglas Stebila, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. 14-37
Side Channels and Fault Attacks
- Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. 41-57 - Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. 58-78 - Tim Beyne, Begül Bilgin:
Uniform First-Order Threshold Implementations. 79-98 - Erick Nascimento, Lukasz Chmielewski, David F. Oswald, Peter Schwabe:
Attacking Embedded ECC Implementations Through cmov Side Channels. 99-119 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud:
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication. 120-139 - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. 140-158
Design and Implementation of Symmetric Cryptography
- Stjepan Picek, Bohan Yang, Vladimir Rozic, Nele Mentens:
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes. 161-179 - Peter Schwabe, Ko Stoffelen:
All the AES You Need on Cortex-M3 and M4. 180-194
Efficient Symmetric Primitives
- Danilo Sijacic, Andreas B. Kidmose, Bohan Yang, Subhadeep Banik, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede:
Hold Your Breath, PRIMATEs Are Lightweight. 197-216 - Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont:
Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design - A New Concept for SCA-Security by Design. 217-230 - Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. 231-244
Cryptanalysis of Symmetric Primitives
- Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens:
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. 247-263 - Yu Sasaki, Yosuke Todo:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. 264-283 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira v1. 284-298 - Jung Hee Cheon, Hyunsook Hong, Joohee Lee, Jooyoung Lee:
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer. 299-316 - Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck:
Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. 317-337
MACs and PRNGs
- Shoichi Hirose, Yusuke Naito, Takeshi Sugawara:
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code. 341-359 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Jacques Traoré:
Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials. 360-380 - Daniel Hutchinson:
A Robust and Sponge-Like PRNG with Improved Efficiency. 381-398
Lattice-Based Cryptography
- Anamaria Costache, Nigel P. Smart, Srinivas Vivek, Adrian Waller:
Fixed-Point Arithmetic in SHE Schemes. 401-422 - Jean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Vincent Zucca:
A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes. 423-442 - Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security Considerations for Galois Non-dual RLWE Families. 443-462
Efficient Classical Public Key Cryptography
- Ping Ngai Chung, Craig Costello, Benjamin Smith:
Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers. 465-481 - Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. 482-500 - Patrick Longa:
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. 501-519
Cryptanalysis of Asymmetric Primitives
- Thijs Laarhoven:
Sieving for Closest Lattice Vectors (with Preprocessing). 523-542 - Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme. 543-558 - Aurore Guillevic, François Morain, Emmanuel Thomé:
Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing Reduction. 559-578
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.