


default search action
BalkanCryptSec 2015: Koper, Slovenia
- Enes Pasalic
, Lars R. Knudsen
:
Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9540, Springer 2016, ISBN 978-3-319-29171-0
Symmetric Key Cryptography
- Konstantinos Limniotis
, Nicholas Kolokotronis
:
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes. 3-16 - Sihem Mesnager, Ferruh Özbudak
, Ahmet Sinak
:
Results on Characterizations of Plateaued Functions in Arbitrary Characteristic. 17-30 - Georgi Ivanov, Nikolay Nikolov
, Svetla Nikova:
Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm. 31-42
Cryptanalysis
- Aleksandra Mileva
, Vesna Dimitrova, Vesselin Velichkov:
Analysis of the Authenticated Cipher MORUS (v1). 45-59 - Yuri L. Borissov, Peter G. Boyvalenkov
, Robert Tsenkov:
Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes. 60-78 - Maciej Skórski
:
Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography. 79-91
Security and Protocols
- Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:
Synchronous Universally Composable Computer Networks. 95-111 - Constantin Catalin Dragan
, Ferucio Laurentiu Tiplea:
Key-Policy Attribute-Based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps. 112-133 - Dirk Achenbach, Matthias Huber, Jörn Müller-Quade, Jochen Rill:
Closing the Gap: A Universal Privacy Framework for Outsourced Data. 134-151
Implementation and Verifiable Encryption
- Sedat Akleylek, Özgür Dagdelen, Zaliha Yüce Tok:
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA. 155-168 - Wei Dai
, Berk Sunar:
cuHE: A Homomorphic Encryption Accelerator Library. 169-186 - James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick:
Extended Functionality in Verifiable Searchable Encryption. 187-205

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.