default search action
BalkanCryptSec 2014: Istanbul, Turkey
- Berna Örs, Bart Preneel:
Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9024, Springer 2015, ISBN 978-3-319-21355-2
Invited Talk
- Aikaterini Mitrokotsa:
Authentication in Constrained Settings. 3-12
Symmetric Cryptography
- Enes Pasalic, Samir Hodzic, Samed Bajric, Yongzhuang Wei:
Optimizing the Placement of Tap Positions. 15-30 - Oguz Yayla:
Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure. 31-39 - Håvard Raddum, Oleksandr Kazymyrov:
Algebraic Attacks Using Binary Decision Diagrams. 40-54
Cryptographic Hardware
- Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Universally Composable Firewall Architectures Using Trusted Hardware. 57-74 - Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Svetla Nikova:
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box. 75-93 - Nele Mentens, Lejla Batina, Selçuk Baktir:
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform. 94-102 - Christian T. Zenger, Abhijit K. Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Christof Paar:
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms. 103-120
Cryptographic Protocols I
- Atilla Bektas, Mehmet Sabir Kiraz, Osmanbey Uzunkol:
A Secure and Efficient Protocol for Electronic Treasury Auctions. 123-140 - Hiromi Arai, Keita Emura, Takahiro Matsuda:
Anonymous Data Collection System with Mediators. 141-160 - Özgür Dagdelen, Daniele Venturi:
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations. 161-172
Public Key Cryptography
- Ferucio Laurentiu Tiplea, Constantin Catalin Dragan:
Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps. 175-193 - Gheorghe A. Schipor:
On the Anonymization of Cocks IBE Scheme. 194-202 - Christian H. Bischof, Johannes Buchmann, Özgür Dagdelen, Robert Fitzpatrick, Florian Göpfert, Artur Mariano:
Nearest Planes in Practice. 203-215
Cryptographic Protocols II
- Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Schemes with Information Theoretic Security. 219-236 - Jan C. A. van der Lubbe, Merel J. de Boer, Zeki Erkin:
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. 237-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.