


default search action
5th SPACE 2015: Jaipur, India
- Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth:

Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. Lecture Notes in Computer Science 9354, Springer 2015, ISBN 978-3-319-24125-8 - Sanjit Chatterjee, Sayantan Mukherjee

, Govind Patidar
:
Efficient Protocol for Authenticated Email Search. 1-20 - Vit Bukac, Vashek Matyas:

Analyzing Traffic Features of Common Standalone DoS Attack Tools. 21-40 - Avik Dayal, Yi Deng, Sandeep K. Shukla:

Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach. 41-54 - Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda

, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. 55-74 - Leo St. Amour

, W. Michael Petullo:
Improving Application Security through TLS-Library Redesign. 75-94 - Subhadeep Banik

, Sonu Jha:
How Not to Combine RC4 States. 95-112 - Riham AlTawy, Amr M. Youssef:

Preimage Analysis of the Maelstrom-0 Hash Function. 113-126 - Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:

Meet-in-the-Middle Attacks on Round-Reduced Khudra. 127-138 - Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:

Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. 139-150 - Claude Carlet:

S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels. 151-171 - Guido Marco Bertoni

, Lorenzo Grassi
, Filippo Melzani
:
Simulations of Optical Emissions for Attacking AES and Masked AES. 172-189 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:

Fault Tolerant Infective Countermeasure for AES. 190-209 - Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:

Modified Transparency Order Property: Solution or Just Another Attempt. 210-227 - Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen:

Investigating SRAM PUFs in large CPUs and GPUs. 228-247 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:

Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. 248-268 - Dan Cvrcek, Petr Svenda

:
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service. 269-288 - Erick Nascimento, Julio López, Ricardo Dahab

:
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers. 289-309 - Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs:

Towards Practical Attribute-Based Signatures. 310-328 - Lukasz Krzywiecki

, Malgorzata Sulkowska, Filip Zagórski
:
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. 329-346 - Mahabir Prasad Jhanwar

, Reihaneh Safavi-Naini:
Compact Accumulator Using Lattices. 347-358 - Mahabir Prasad Jhanwar

, Reihaneh Safavi-Naini:
Almost Optimum Secret Sharing with Cheating Detection. 359-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














