ECRYPT Logo

coordination & support action ECRYPT-CSA

research network ECRYPT-NET

Scientific Publications

ePrint Archive: Report 2016/156
More Efficient Constant-Round Multi-party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, and Eduardo Soria-Vazquez
Published in: Hirt M., Smith A. (eds) Theory of Cryptography - TCC 2016, Lecture Notes in Computer Science, Vol 9985. Springer-Verlag, 2016, pp. 554-581.
WorkPackage: WP2
ePrint Archive: Report 2016/647
Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in: Gierlichs B., Poschmann A. (eds) Cryptographic Hardware and Embedded Systems – CHES 2016, Lecture Notes in Computer Science, Vol 9813. Springer-Verlag, 2016, pp. 171-193.
WorkPackage: WP3
ePrint Archive: Report 2016/381
FHE Circuit Privacy Almost For Free
F. Bourse, R. del Pino, M. Minelli, H. Wee
Published in: Robshaw M., Katz J. (eds) Advances in Cryptology – CRYPTO 2016, Lecture Notes in Computer Science, Vol 9815. Springer-Verlag, 2016, pp. 62-89.
WorkPackage: WP2
pdf of paper
Extreme Pipelining Towards the Best Area-performance Trade-off in Hardware
S. Picek, D. Sisejkovic, D. Jakobovic, L. Batina, B. Yang, D. Sijacic, and N. Mentens
Published in: Pointcheval D., Nitaj A., Rachidi T. (eds) Progress in Cryptology - AFRICACRYPT 2016, Lecture Notes in Computer Science, Vol. 9646. Springer-Verlag, 2016, pp. 147-166.
WorkPackage: WP3
ePrint Archive: Report 2016/841
A Methodology for the Characterisation of Leakages in Combinatorial Logic
G.Bertoni, M. Martinoli
Published in: Carlet C., Hasan M., Saraswat V. (eds) Security, Privacy and Applied Cryptographic Engineering - SPACE 2016, Lecture Notes in Computer Science, Vol. 10076. Springer-Verlag, 2016, pp. 363-382.
WorkPackage: WP3
pdf of paper not yet available
Hold Your Breath, PRIMATEs Are Lightweight
D. Sijacic, A. B. Kidmose, B. Yang, S. Banik, B. Bilgin, A. Bogdanov, and I.Verbauwhede
Published in: Selected Areas in Cryptography - SAC 2016, Lecture Notes in Computer Science, Springer-Verlag, 17 pages, to appear.
WorkPackage: WP3
pdf of paper
Security of BLS and BGLS signatures in a multi-user setting
Marie-Sarah Lacharité
Presented at: ArcticCrypt 2016, Longyearbyen, Svalbard, Norway, 17-22 July 2016.
Submitted to: the journal Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences.
WorkPackage: WP2
ePrint Archive: Report 2016/740
Software Benchmarking of the 2nd round CAESAR Candidates
Ralph Ankele and Robin Ankele
Presented at: Directions in Authenticated Ciphers - DIAC 2016, Nagoya, Japan, 25-27 September 2016.
WorkPackage: WP1
ePrint Archive: Report 2015/1158
A note on the optimality of frequency analysis vs. lp-optimization
Marie-Sarah Lacharité and Kenneth G. Paterson
WorkPackage: WP2, Date: 30 Nov 2015
ePrint Archive: Report 2016/1127
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang
WorkPackage: WP1, Date: 1 Dec 2016

This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No. 643161.

H2020

Project reference: 643161
Start date: 01-03-2015
End date: 28-02-2019
Duration: 48 months

Project funding: € 3.893.200
Programme: H2020
Call: H2020-MSCA-ITN-2014
Action: Training Networks