


default search action
85. Birthday: David Kahn , 2016
- Peter Y. A. Ryan

, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7
History
- Valérie Nachef, Jacques Patarin, Armel Dubois-Nayt:

Mary of Guise's Enciphered Letters. 3-24 - Sébastien-Yves Laurent:

About Professionalisation in the Intelligence Community: The French Cryptologists (ca 1870-ca 1945). 25-33 - Sophie de Lastours:

Myths and Legends of the History of Cryptology. 34-39 - Steven M. Bellovin:

Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence. 40-66
Technology - Past, Present, Future
- Flavio D. Garcia

, Bart Jacobs:
The Fall of a Tiny Star. 69-87 - Johannes Buchmann, Denis Butin

, Florian Göpfert, Albrecht Petzoldt:
Post-Quantum Cryptography: State of the Art. 88-108 - Yvo Desmedt:

What is the Future of Cryptography? 109-122
Efficient Cryptographic Implementations
- Rone Kwei Lim, Linda R. Petzold, Çetin Kaya Koç:

Bitsliced High-Performance AES-ECB on GPUs. 125-133 - Rodrigo Portella do Canto, Roman Korkikian, David Naccache:

Buying AES Design Resistance with Speed and Energy. 134-147 - Rémi Géraud

, Diana Maimut
, David Naccache:
Double-Speed Barrett Moduli. 148-158
Treachery and Perfidy
- Antoine Amarilli, Marc Beunardeau, Rémi Géraud

, David Naccache:
Failure is Also an Option. 161-165 - Céline Chevalier, Damien Gaumont

, David Naccache, Rodrigo Portella do Canto:
How to (Carefully) Breach a Service Contract? 166-173
Information Security
- Markus Jakobsson, Hossein Siadati

:
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention. 177-194 - Dieter Gollmann, Marina Krotofil:

Cyber-Physical Systems Security. 195-204 - Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga

, Pierangela Samarati
:
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud. 205-239
Cryptanalysis
- Adam L. Young, Moti Yung:

Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack. 243-255 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen:

Dual EC: A Standardized Back Door. 256-281 - Nicolas T. Courtois:

An Improved Differential Attack on Full GOST. 282-303 - Christophe Petit

, Jean-Jacques Quisquater:
Cryptographic Hash Functions and Expander Graphs: The End of the Story? 304-311
Side-Channel Attacks
- Claude Carlet, Emmanuel Prouff:

Polynomial Evaluation and Side Channel Analysis. 315-341 - Jean-Max Dutertre

, Amir-Pasha Mirbaha, David Naccache, Assia Tria:
Photonic Power Firewalls. 342-354 - Christophe Clavier, Djamal Rebaine:

A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard. 355-373 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:

Improving the Big Mac Attack on Elliptic Curve Cryptography. 374-386
Randomness
- Marek Sýs

, Vashek Matyás:
Randomness Testing: Result Interpretation and Speed. 389-395 - Marco Bucci, Raimondo Luzzi:

A Fully-Digital Chaos-Based Random Bit Generator. 396-414
Embedded System Security
- Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram

, Konstantinos Markantonakis
:
Secure Application Execution in Mobile Devices. 417-438 - Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert:

Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. 439-454
Public-Key Cryptography
- Julien Bringer, Hervé Chabanne

, Roch Lescuyer, Alain Patey:
Hierarchical Identities from Group Signatures and Pseudonymous Signatures. 457-469 - Marc Joye:

Secure ElGamal-Type Cryptosystems Without Message Encoding. 470-478 - Pierre-Alain Fouque

, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected Implementations with the Atomicity Technique. 479-493
Models and Protocols
- Serge Vaudenay:

Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security. 497-517 - Jean-Sébastien Coron:

Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. 518-542 - Peter Y. A. Ryan

:
Crypto Santa. 543-549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














