default search action
85. Birthday: David Kahn , 2016
- Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7
History
- Valérie Nachef, Jacques Patarin, Armel Dubois-Nayt:
Mary of Guise's Enciphered Letters. 3-24 - Sébastien-Yves Laurent:
About Professionalisation in the Intelligence Community: The French Cryptologists (ca 1870-ca 1945). 25-33 - Sophie de Lastours:
Myths and Legends of the History of Cryptology. 34-39 - Steven M. Bellovin:
Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence. 40-66
Technology - Past, Present, Future
- Flavio D. Garcia, Bart Jacobs:
The Fall of a Tiny Star. 69-87 - Johannes Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt:
Post-Quantum Cryptography: State of the Art. 88-108 - Yvo Desmedt:
What is the Future of Cryptography? 109-122
Efficient Cryptographic Implementations
- Rone Kwei Lim, Linda R. Petzold, Çetin Kaya Koç:
Bitsliced High-Performance AES-ECB on GPUs. 125-133 - Rodrigo Portella do Canto, Roman Korkikian, David Naccache:
Buying AES Design Resistance with Speed and Energy. 134-147 - Rémi Géraud, Diana Maimut, David Naccache:
Double-Speed Barrett Moduli. 148-158
Treachery and Perfidy
- Antoine Amarilli, Marc Beunardeau, Rémi Géraud, David Naccache:
Failure is Also an Option. 161-165 - Céline Chevalier, Damien Gaumont, David Naccache, Rodrigo Portella do Canto:
How to (Carefully) Breach a Service Contract? 166-173
Information Security
- Markus Jakobsson, Hossein Siadati:
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention. 177-194 - Dieter Gollmann, Marina Krotofil:
Cyber-Physical Systems Security. 195-204 - Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati:
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud. 205-239
Cryptanalysis
- Adam L. Young, Moti Yung:
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack. 243-255 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen:
Dual EC: A Standardized Back Door. 256-281 - Nicolas T. Courtois:
An Improved Differential Attack on Full GOST. 282-303 - Christophe Petit, Jean-Jacques Quisquater:
Cryptographic Hash Functions and Expander Graphs: The End of the Story? 304-311
Side-Channel Attacks
- Claude Carlet, Emmanuel Prouff:
Polynomial Evaluation and Side Channel Analysis. 315-341 - Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria:
Photonic Power Firewalls. 342-354 - Christophe Clavier, Djamal Rebaine:
A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard. 355-373 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Improving the Big Mac Attack on Elliptic Curve Cryptography. 374-386
Randomness
- Marek Sýs, Vashek Matyás:
Randomness Testing: Result Interpretation and Speed. 389-395 - Marco Bucci, Raimondo Luzzi:
A Fully-Digital Chaos-Based Random Bit Generator. 396-414
Embedded System Security
- Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Application Execution in Mobile Devices. 417-438 - Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert:
Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. 439-454
Public-Key Cryptography
- Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Hierarchical Identities from Group Signatures and Pseudonymous Signatures. 457-469 - Marc Joye:
Secure ElGamal-Type Cryptosystems Without Message Encoding. 470-478 - Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected Implementations with the Atomicity Technique. 479-493
Models and Protocols
- Serge Vaudenay:
Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security. 497-517 - Jean-Sébastien Coron:
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. 518-542 - Peter Y. A. Ryan:
Crypto Santa. 543-549
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.