


default search action
23rd SAC 2016: St. John's, NL, Canada
- Roberto Avanzi, Howard M. Heys:

Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10532, Springer 2017, ISBN 978-3-319-69452-8
Invited Lectures
- Francesco Regazzoni

:
Physical Attacks and Beyond. 3-13 - Douglas Stebila

, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. 14-37
Side Channels and Fault Attacks
- Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. 41-57 - Tobias Schneider, Amir Moradi

, François-Xavier Standaert
, Tim Güneysu
:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. 58-78 - Tim Beyne

, Begül Bilgin:
Uniform First-Order Threshold Implementations. 79-98 - Erick Nascimento, Lukasz Chmielewski, David F. Oswald

, Peter Schwabe:
Attacking Embedded ECC Implementations Through cmov Side Channels. 99-119 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud

:
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication. 120-139 - Thomas Espitau, Pierre-Alain Fouque

, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. 140-158
Design and Implementation of Symmetric Cryptography
- Stjepan Picek, Bohan Yang, Vladimir Rozic, Nele Mentens

:
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes. 161-179 - Peter Schwabe, Ko Stoffelen:

All the AES You Need on Cortex-M3 and M4. 180-194
Efficient Symmetric Primitives
- Danilo Sijacic, Andreas B. Kidmose

, Bohan Yang, Subhadeep Banik
, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede
:
Hold Your Breath, PRIMATEs Are Lightweight. 197-216 - Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont

:
Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design - A New Concept for SCA-Security by Design. 217-230 - Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont

:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. 231-244
Cryptanalysis of Symmetric Primitives
- Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens

:
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. 247-263 - Yu Sasaki, Yosuke Todo

:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. 264-283 - Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
:
Cryptanalysis of Simpira v1. 284-298 - Jung Hee Cheon, Hyunsook Hong, Joohee Lee

, Jooyoung Lee:
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer. 299-316 - Matthew Amy, Olivia Di Matteo

, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck:
Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. 317-337
MACs and PRNGs
- Shoichi Hirose, Yusuke Naito, Takeshi Sugawara:

Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code. 341-359 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Jacques Traoré:

Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials. 360-380 - Daniel Hutchinson:

A Robust and Sponge-Like PRNG with Improved Efficiency. 381-398
Lattice-Based Cryptography
- Anamaria Costache, Nigel P. Smart, Srinivas Vivek

, Adrian Waller:
Fixed-Point Arithmetic in SHE Schemes. 401-422 - Jean-Claude Bajard

, Julien Eynard, M. Anwar Hasan, Vincent Zucca:
A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes. 423-442 - Hao Chen, Kristin E. Lauter, Katherine E. Stange

:
Security Considerations for Galois Non-dual RLWE Families. 443-462
Efficient Classical Public Key Cryptography
- Ping Ngai Chung, Craig Costello

, Benjamin Smith
:
Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers. 465-481 - Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:

PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. 482-500 - Patrick Longa:

FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. 501-519
Cryptanalysis of Asymmetric Primitives
- Thijs Laarhoven

:
Sieving for Closest Lattice Vectors (with Preprocessing). 523-542 - Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:

Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme. 543-558 - Aurore Guillevic

, François Morain, Emmanuel Thomé
:
Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing Reduction. 559-578

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














