↓ Skip to main content

Selected Areas in Cryptography – SAC 2016

Overview of attention for book
Cover of 'Selected Areas in Cryptography – SAC 2016'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Physical Attacks and Beyond
  3. Altmetric Badge
    Chapter 2 Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project
  4. Altmetric Badge
    Chapter 3 Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme—Presenting Four Non-profiled Attacks
  5. Altmetric Badge
    Chapter 4 Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms
  6. Altmetric Badge
    Chapter 5 Uniform First-Order Threshold Implementations
  7. Altmetric Badge
    Chapter 6 Attacking Embedded ECC Implementations Through cmov Side Channels
  8. Altmetric Badge
    Chapter 7 Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication
  9. Altmetric Badge
    Chapter 8 Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures
  10. Altmetric Badge
    Chapter 9 On the Construction of Hardware-Friendly $$4\times 4$$ and $$5\times 5$$ S-Boxes
  11. Altmetric Badge
    Chapter 10 All the AES You Need on Cortex-M3 and M4
  12. Altmetric Badge
    Chapter 11 Hold Your Breath, PRIMATEs Are Lightweight
  13. Altmetric Badge
    Chapter 12 Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design
  14. Altmetric Badge
    Chapter 13 Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy
  15. Altmetric Badge
    Chapter 14 New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity
  16. Altmetric Badge
    Chapter 15 New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network
  17. Altmetric Badge
    Chapter 16 Cryptanalysis of Simpira v1
  18. Altmetric Badge
    Chapter 17 An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer
  19. Altmetric Badge
    Chapter 18 Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3
  20. Altmetric Badge
    Chapter 19 Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code
  21. Altmetric Badge
    Chapter 20 Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials
  22. Altmetric Badge
    Chapter 21 A Robust and Sponge-Like PRNG with Improved Efficiency
  23. Altmetric Badge
    Chapter 22 Fixed-Point Arithmetic in SHE Schemes
  24. Altmetric Badge
    Chapter 23 A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes
  25. Altmetric Badge
    Chapter 24 Security Considerations for Galois Non-dual RLWE Families
  26. Altmetric Badge
    Chapter 25 Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers
  27. Altmetric Badge
    Chapter 26 PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA
  28. Altmetric Badge
    Chapter 27 Four $$\mathbb {Q}$$ NEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
  29. Altmetric Badge
    Chapter 28 Sieving for Closest Lattice Vectors (with Preprocessing)
  30. Altmetric Badge
    Chapter 29 Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme
  31. Altmetric Badge
    Chapter 30 Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing Reduction
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

policy
1 policy source
twitter
1 X user
patent
1 patent
wikipedia
1 Wikipedia page

Citations

dimensions_citation
2 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Selected Areas in Cryptography – SAC 2016
Published by
Springer, Cham, January 2016
DOI 10.1007/978-3-319-69453-5
ISBNs
978-3-31-969452-8, 978-3-31-969453-5
Editors

Roberto Avanzi, Howard Heys

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.