Abstract is missing.
- Physical Attacks and BeyondFrancesco Regazzoni. 3-13 [doi]
- Post-quantum Key Exchange for the Internet and the Open Quantum Safe ProjectDouglas Stebila, Michele Mosca. 14-37 [doi]
- Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled AttacksZeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu. 41-57 [doi]
- Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and HistogramsTobias Schneider 0002, Amir Moradi 0001, François-Xavier Standaert, Tim Güneysu. 58-78 [doi]
- Uniform First-Order Threshold ImplementationsTim Beyne, Begül Bilgin. 79-98 [doi]
- Attacking Embedded ECC Implementations Through cmov Side ChannelsErick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe. 99-119 [doi]
- Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar MultiplicationDahmun Goudarzi, Matthieu Rivain, Damien Vergnaud. 120-139 [doi]
- Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign SignaturesThomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi. 140-158 [doi]
- On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-BoxesStjepan Picek, Bohan Yang 0001, Vladimir Rozic, Nele Mentens. 161-179 [doi]
- All the AES You Need on Cortex-M3 and M4Peter Schwabe, Ko Stoffelen. 180-194 [doi]
- Hold Your Breath, PRIMATEs Are LightweightDanilo Sijacic, Andreas B. Kidmose, Bohan Yang 0001, Subhadeep Banik, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede. 197-216 [doi]
- Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design - A New Concept for SCA-Security by DesignMostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont. 217-230 [doi]
- Lightweight Fault Attack Resistance in Software Using Intra-instruction RedundancyConor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont. 231-244 [doi]
- New Second Preimage Attacks on Dithered Hash Functions with Low Memory ComplexityMuhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens. 247-263 [doi]
- New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel NetworkYu Sasaki, Yosuke Todo. 264-283 [doi]
- Cryptanalysis of Simpira v1Christoph Dobraunig, Maria Eichlseder, Florian Mendel. 284-298 [doi]
- An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine LayerJung Hee Cheon, Hyunsook Hong, Joohee Lee, Jooyoung Lee. 299-316 [doi]
- Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck. 317-337 [doi]
- Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication CodeShoichi Hirose, Yusuke Naito 0001, Takeshi Sugawara. 341-359 [doi]
- Improved Algebraic MACs and Practical Keyed-Verification Anonymous CredentialsAmira Barki, Solenn Brunet, Nicolas Desmoulins, Jacques Traoré. 360-380 [doi]
- A Robust and Sponge-Like PRNG with Improved EfficiencyDaniel Hutchinson. 381-398 [doi]
- Fixed-Point Arithmetic in SHE SchemesAnamaria Costache, Nigel P. Smart, Srinivas Vivek, Adrian Waller. 401-422 [doi]
- A Full RNS Variant of FV Like Somewhat Homomorphic Encryption SchemesJean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Vincent Zucca. 423-442 [doi]
- Security Considerations for Galois Non-dual RLWE FamiliesHao Chen, Kristin E. Lauter, Katherine E. Stange. 443-462 [doi]
- Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast KummersPing Ngai Chung, Craig Costello, Benjamin Smith. 465-481 [doi]
- PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSAYuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu 0005, Cong Xue, Fangyu Zheng. 482-500 [doi]
- FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM ProcessorsPatrick Longa. 501-519 [doi]
- Sieving for Closest Lattice Vectors (with Preprocessing)Thijs Laarhoven. 523-542 [doi]
- Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption SchemeDustin Moody, Ray A. Perlner, Daniel Smith-Tone. 543-558 [doi]
- Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing ReductionAurore Guillevic, François Morain, Emmanuel Thomé. 559-578 [doi]