Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience (Englisch)
- Neue Suche nach: Carlet, Claude
- Neue Suche nach: Heuser, Annelie
- Neue Suche nach: Picek, Stjepan
- Neue Suche nach: Gollmann, Dieter
- Neue Suche nach: Miyaji, Atsuko
- Neue Suche nach: Kikuchi, Hiroaki
- Neue Suche nach: Carlet, Claude
- Neue Suche nach: Heuser, Annelie
- Neue Suche nach: Picek, Stjepan
In:
Applied Cryptography and Network Security
: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
;
Kapitel: 20
;
393-414
;
2017
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Gollmann, Dieter ( Herausgeber:in ) / Miyaji, Atsuko ( Herausgeber:in ) / Kikuchi, Hiroaki ( Herausgeber:in ) / Carlet, Claude ( Autor:in ) / Heuser, Annelie ( Autor:in ) / Picek, Stjepan ( Autor:in )
-
Kongress:International Conference on Applied Cryptography and Network Security ; 2017 ; Kanazawa, Japan
-
Erschienen in:Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings ; Kapitel: 20 ; 393-414Lecture Notes in Computer Science ; 10355 ; 393-414Security and Cryptology ; 393-414
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:26.06.2017
-
Format / Umfang:22 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyAguilar-Melchor, Carlos / Albrecht, Martin R. / Ricosset, Thomas et al. | 2017
- 2
-
Simple Security Definitions for and Constructions of 0-RTT Key ExchangeHale, Britta / Jager, Tibor / Lauer, Sebastian / Schwenk, Jörg et al. | 2017
- 3
-
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRFJarecki, Stanisław / Kiayias, Aggelos / Krawczyk, Hugo / Xu, Jiayu et al. | 2017
- 4
-
Secure and Efficient Pairing at 256-Bit Security LevelKiyomura, Yutaro / Inoue, Akiko / Kawahara, Yuto / Yasuda, Masaya / Takagi, Tsuyoshi / Kobayashi, Tetsutaro et al. | 2017
- 5
-
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile DevicesSpolaor, Riccardo / Abudahi, Laila / Moonsamy, Veelasha / Conti, Mauro / Poovendran, Radha et al. | 2017
- 6
-
Are You Lying: Validating the Time-Location of Outdoor ImagesLi, Xiaopeng / Xu, Wenyuan / Wang, Song / Qu, Xianshan et al. | 2017
- 7
-
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security TasksBerg, Bruce / Kaczmarek, Tyler / Kobsa, Alfred / Tsudik, Gene et al. | 2017
- 8
-
A Pilot Study of Multiple Password Interference Between Text and Map-Based PasswordsMeng, Weizhi / Li, Wenjuan / Lee, Wang Hao / Jiang, Lijun / Zhou, Jianying et al. | 2017
- 9
-
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-SecurityChen, Yi-Ruei / Tzeng, Wen-Guey et al. | 2017
- 10
-
A Novel GPU-Based Implementation of the Cube AttackCianfriglia, Marco / Guarino, Stefano / Bernaschi, Massimo / Lombardi, Flavio / Pedicini, Marco et al. | 2017
- 11
-
Related-Key Impossible-Differential Attack on Reduced-Round SkinnyAnkele, Ralph / Banik, Subhadeep / Chakraborti, Avik / List, Eik / Mendel, Florian / Sim, Siang Meng / Wang, Gaoli et al. | 2017
- 12
-
Faster Secure Multi-party Computation of AES and DES Using Lookup TablesKeller, Marcel / Orsini, Emmanuela / Rotaru, Dragos / Scholl, Peter / Soria-Vazquez, Eduardo / Vivek, Srinivas et al. | 2017
- 13
-
An Experimental Study of the BDD Approach for the Search LWE ProblemXu, Rui / Yeo, Sze Ling / Fukushima, Kazuhide / Takagi, Tsuyoshi / Seo, Hwajung / Kiyomoto, Shinsaku / Henricksen, Matt et al. | 2017
- 14
-
Efficiently Obfuscating Re-Encryption Program Under DDH AssumptionSrinivasan, Akshayaram / Pandu Rangan, Chandrasekaran et al. | 2017
- 15
-
Lattice-Based Group Signatures: Achieving Full Dynamicity with EaseLing, San / Nguyen, Khoa / Wang, Huaxiong / Xu, Yanhong et al. | 2017
- 16
-
Breaking and Fixing Mobile App Authentication with OAuth2.0-based ProtocolsYang, Ronghai / Lau, Wing Cheong / Shi, Shangcheng et al. | 2017
- 17
-
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)Bernhard, David / Nguyen, Ngoc Khanh / Warinschi, Bogdan et al. | 2017
- 18
-
More Efficient Construction of Bounded KDM Secure EncryptionKurosawa, Kaoru / Habuka, Rie et al. | 2017
- 19
-
Signature Schemes with Randomized VerificationFreitag, Cody / Goyal, Rishab / Hohenberger, Susan / Koppula, Venkata / Lee, Eysa / Okamoto, Tatsuaki / Tran, Jordan / Waters, Brent et al. | 2017
- 20
-
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel ResilienceCarlet, Claude / Heuser, Annelie / Picek, Stjepan et al. | 2017
- 21
-
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening LayersTu, Chenyang / Zhang, Lingchen / Liu, Zeyi / Gao, Neng / Ma, Yuan et al. | 2017
- 22
-
Side-Channel Attacks Meet Secure Network ProtocolsBiryukov, Alex / Dinu, Daniel / Le Corre, Yann et al. | 2017
- 23
-
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature SchemesBoneh, Dan / Kim, Sam / Nikolaenko, Valeria et al. | 2017
- 24
-
Forward-Secure Searchable Encryption on Labeled Bipartite GraphsLai, Russell W. F. / Chow, Sherman S. M. et al. | 2017
- 25
-
Bounds in Various Generalized Settings of the Discrete Logarithm ProblemYing, Jason H. M. / Kunihiro, Noboru et al. | 2017
- 26
-
An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic CryptanalysisYeo, Sze Ling / Li, Zhen / Khoo, Khoongming / Low, Yu Bin et al. | 2017
- 27
-
SCRAPE: Scalable Randomness Attested by Public EntitiesCascudo, Ignacio / David, Bernardo et al. | 2017
- 28
-
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic OperationsChaum, David / Das, Debajyoti / Javani, Farid / Kate, Aniket / Krasnova, Anna / De Ruiter, Joeri / Sherman, Alan T. et al. | 2017
- 29
-
Almost Optimal Oblivious Transfer from QA-NIZKBlazy, Olivier / Chevalier, Céline / Germouty, Paul et al. | 2017
- 30
-
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication NetworksDemmler, Daniel / Holz, Marco / Schneider, Thomas et al. | 2017
- 31
-
Accountable StorageAteniese, Giuseppe / Goodrich, Michael T. / Lekakis, Vassilios / Papamanthou, Charalampos / Paraskevas, Evripidis / Tamassia, Roberto et al. | 2017
- 32
-
Maliciously Secure Multi-Client ORAMMaffei, Matteo / Malavolta, Giulio / Reinert, Manuel / Schröder, Dominique et al. | 2017
- 33
-
Legacy-Compliant Data Authentication for Industrial Control System TrafficCastellanos, John Henry / Antonioli, Daniele / Tippenhauer, Nils Ole / Ochoa, Martín et al. | 2017
- 34
-
Multi-client Oblivious RAM Secure Against Malicious ServersBlass, Erik-Oliver / Mayberry, Travis / Noubir, Guevara et al. | 2017