


default search action
6th SPACE 2016: Hyderabad, India
- Claude Carlet, M. Anwar Hasan, Vishal Saraswat:

Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Lecture Notes in Computer Science 10076, Springer 2016, ISBN 978-3-319-49444-9
Deep Learning and Fault Based Attacks
- Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff:

Breaking Cryptographic Implementations Using Deep Learning Techniques. 3-26 - Wei He, Jakub Breier

, Shivam Bhasin:
Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks. 27-46 - Wei He, Jakub Breier

, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan
:
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA. 47-65 - Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi

:
Fault Based Almost Universal Forgeries on CLOC and SILC. 66-86
Applied Cryptography
- Pedro Maat C. Massolino, Joost Renes, Lejla Batina:

Implementing Complete Formulas on Weierstrass Curves in Hardware. 89-108 - Jian Liu, Sihem Mesnager, Lusheng Chen:

Partially Homomorphic Encryption Schemes over Finite Fields. 109-123 - Payingat Jilna

, P. P. Deepthi:
Light Weight Key Establishment Scheme for Wireless Sensor Networks. 124-137 - Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud

, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout
:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. 138-156
Iterative Ciphers
- Joan Daemen:

Spectral Characterization of Iterating Lossy Mappings. 159-178 - Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy

:
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE. 179-193 - Dhiman Saha, Sourya Kakarla

, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. 194-210
Hardware Security
- Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:

Predictive Aging of Reliability of Two Delay PUFs. 213-232 - Dina Kamel, Guerric de Streel, Santos Merino Del Pozo

, Kashif Nawaz
, François-Xavier Standaert
, Denis Flandre
, David Bol:
Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers. 233-248
Security
- Jeffrey Burdges

, Florian Dold, Christian Grothoff, Marcello Stanisci:
Enabling Secure Web Payments with GNU Taler. 251-270 - Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur:

Malware Characterization Using Windows API Call Sequences. 271-280 - Ajay Kumara M. A., Jaidhar C. D.:

VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment. 281-300
Post-quantum Cryptology
- Peter Schwabe, Bas Westerbaan

:
Solving Binary MQ with Grover's Algorithm. 303-322 - Sujoy Sinha Roy, Angshuman Karmakar

, Ingrid Verbauwhede
:
Ring-LWE: Applications to Cryptography and Their Efficient Realization. 323-331 - Erdem Alkim

, Philipp Jakubeit, Peter Schwabe:
NewHope on ARM Cortex-M. 332-349
Leakage, Power and Fault Analysis
- François-Xavier Standaert

:
Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk). 353-362 - Guido Bertoni

, Marco Martinoli:
A Methodology for the Characterisation of Leakages in Combinatorial Logic. 363-382 - Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati, Somitra Kumar Sanadhya

:
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes. 383-401 - Stephane Fernandes Medeiros, François Gérard, Nikita Veshchikov, Liran Lerman, Olivier Markowitch:

Breaking Kalyna 128/128 with Power Attacks. 402-414 - Shivam Bhasin, Debdeep Mukhopadhyay:

Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial. 415-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














