default search action
6th SPACE 2016: Hyderabad, India
- Claude Carlet, M. Anwar Hasan, Vishal Saraswat:
Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Lecture Notes in Computer Science 10076, Springer 2016, ISBN 978-3-319-49444-9
Deep Learning and Fault Based Attacks
- Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff:
Breaking Cryptographic Implementations Using Deep Learning Techniques. 3-26 - Wei He, Jakub Breier, Shivam Bhasin:
Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks. 27-46 - Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan:
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA. 47-65 - Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Fault Based Almost Universal Forgeries on CLOC and SILC. 66-86
Applied Cryptography
- Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. 89-108 - Jian Liu, Sihem Mesnager, Lusheng Chen:
Partially Homomorphic Encryption Schemes over Finite Fields. 109-123 - Payingat Jilna, P. P. Deepthi:
Light Weight Key Establishment Scheme for Wireless Sensor Networks. 124-137 - Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. 138-156
Iterative Ciphers
- Joan Daemen:
Spectral Characterization of Iterating Lossy Mappings. 159-178 - Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy:
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE. 179-193 - Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. 194-210
Hardware Security
- Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:
Predictive Aging of Reliability of Two Delay PUFs. 213-232 - Dina Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, David Bol:
Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers. 233-248
Security
- Jeffrey Burdges, Florian Dold, Christian Grothoff, Marcello Stanisci:
Enabling Secure Web Payments with GNU Taler. 251-270 - Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur:
Malware Characterization Using Windows API Call Sequences. 271-280 - Ajay Kumara M. A., Jaidhar C. D.:
VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment. 281-300
Post-quantum Cryptology
- Peter Schwabe, Bas Westerbaan:
Solving Binary MQ with Grover's Algorithm. 303-322 - Sujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede:
Ring-LWE: Applications to Cryptography and Their Efficient Realization. 323-331 - Erdem Alkim, Philipp Jakubeit, Peter Schwabe:
NewHope on ARM Cortex-M. 332-349
Leakage, Power and Fault Analysis
- François-Xavier Standaert:
Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk). 353-362 - Guido Bertoni, Marco Martinoli:
A Methodology for the Characterisation of Leakages in Combinatorial Logic. 363-382 - Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati, Somitra Kumar Sanadhya:
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes. 383-401 - Stephane Fernandes Medeiros, François Gérard, Nikita Veshchikov, Liran Lerman, Olivier Markowitch:
Breaking Kalyna 128/128 with Power Attacks. 402-414 - Shivam Bhasin, Debdeep Mukhopadhyay:
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial. 415-418
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.