


default search action
BalkanCryptSec 2014: Istanbul, Turkey
- Berna Örs, Bart Preneel

:
Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9024, Springer 2015, ISBN 978-3-319-21355-2
Invited Talk
- Aikaterini Mitrokotsa:

Authentication in Constrained Settings. 3-12
Symmetric Cryptography
- Enes Pasalic

, Samir Hodzic, Samed Bajric, Yongzhuang Wei:
Optimizing the Placement of Tap Positions. 15-30 - Oguz Yayla

:
Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure. 31-39 - Håvard Raddum

, Oleksandr Kazymyrov:
Algebraic Attacks Using Binary Decision Diagrams. 40-54
Cryptographic Hardware
- Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:

Universally Composable Firewall Architectures Using Trusted Hardware. 57-74 - Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Svetla Nikova

:
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box. 75-93 - Nele Mentens

, Lejla Batina, Selçuk Baktir
:
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform. 94-102 - Christian T. Zenger

, Abhijit K. Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten
, Christof Paar:
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms. 103-120
Cryptographic Protocols I
- Atilla Bektas, Mehmet Sabir Kiraz

, Osmanbey Uzunkol:
A Secure and Efficient Protocol for Electronic Treasury Auctions. 123-140 - Hiromi Arai, Keita Emura

, Takahiro Matsuda
:
Anonymous Data Collection System with Mediators. 141-160 - Özgür Dagdelen, Daniele Venturi

:
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations. 161-172
Public Key Cryptography
- Ferucio Laurentiu Tiplea, Constantin Catalin Dragan

:
Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps. 175-193 - Gheorghe A. Schipor:

On the Anonymization of Cocks IBE Scheme. 194-202 - Christian H. Bischof, Johannes Buchmann, Özgür Dagdelen, Robert Fitzpatrick, Florian Göpfert, Artur Mariano:

Nearest Planes in Practice. 203-215
Cryptographic Protocols II
- Yohei Watanabe, Junji Shikata:

Timed-Release Secret Sharing Schemes with Information Theoretic Security. 219-236 - Jan C. A. van der Lubbe, Merel J. de Boer, Zeki Erkin

:
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. 237-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














