


default search action
4th SPACE 2014: Pune, India
- Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont

:
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings. Lecture Notes in Computer Science 8804, Springer 2014, ISBN 978-3-319-12059-1
Invited Paper I
- Phuong Ha Nguyen, Durga Prasad Sahoo:

Lightweight and Secure PUFs: A Survey (Invited Paper). 1-13
Cryptographic Building Blocks I
- Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:

Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? 14-27 - Andreas Enge, Jérôme Milan:

Implementing Cryptographic Pairings at Standard Security Levels. 28-46 - Partha Sarathi Roy

, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. 47-58 - Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:

CASH: Cellular Automata Based Parameterized Hash. 59-75 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme. 76-91
Invited Paper II
- Radim Ostádal, Petr Svenda

, Václav Matyás:
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper). 92-109
Mini Tutorial
- Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai:

Differential Power Analysis Attack on SIMON and LED Block Ciphers. 110-125
Cryptographic Building Blocks II
- Souvik Kolay, Debdeep Mukhopadhyay:

Khudra: A New Lightweight Block Cipher for FPGAs. 126-145 - Sashank Dara, Scott R. Fluhrer:

FNR: Arbitrary Length Small Domain Block Cipher Proposal. 146-154 - Abhrajit Sengupta, Dhiman Saha

, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. 155-170 - Raghuvir Songhela, Manik Lal Das:

Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. 171-182
Attacks and Countermeasures
- Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:

Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. 183-200 - Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:

Analysis and Improvements of the DPA Contest v4 Implementation. 201-218 - Subhabrata Samajder

, Palash Sarkar:
Some Randomness Experiments on TRIVIUM. 219-236
Tools and Methods
- Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:

Randomized Batch Verification of Standard ECDSA Signatures. 237-255 - Sabyasachi Karati, Abhijit Das:

Batch Verification of EdDSA Signatures. 256-271 - Marek Sýs

, Zdenek Ríha:
Faster Randomness Testing with the NIST Statistical Test Suite. 272-284
Secure Systems and Applications
- Jungmin Park, Akhilesh Tyagi:

t-Private Systems: Unified Private Memories and Computation. 285-302 - A. M. Aswini, P. Vinod:

Android Malware Analysis Using Ensemble Features. 303-318 - K. A. Asmitha, P. Vinod:

Linux Malware Detection Using eXtended-Symmetric Uncertainty. 319-332

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














