ECRYPT Logo

coordination & support action ECRYPT-CSA

research network ECRYPT-NET

Scientific Publications

ePrint Archive: Report 2015/1158
A note on the optimality of frequency analysis vs. lp-optimization
Marie-Sarah Lacharité and Kenneth G. Paterson
WorkPackage: WP2, Date: 30 Nov 2015
pdf of paper
Extreme Pipelining Towards the Best Area-performance Trade-off in Hardware
S. Picek, D. Sisejkovic, D. Jakobovic, L. Batina, B. Yang, D. Sijacic, and N. Mentens
Published in: Pointcheval D., Nitaj A., Rachidi T. (eds) Progress in Cryptology - AFRICACRYPT 2016, Lecture Notes in Computer Science, Vol. 9646. Springer-Verlag, 2016, pp. 147-166.
WorkPackage: WP3
ePrint Archive: Report 2016/647
Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in: Gierlichs B., Poschmann A. (eds) Cryptographic Hardware and Embedded Systems – CHES 2016, Lecture Notes in Computer Science, Vol 9813. Springer-Verlag, 2016, pp. 171-193.
WorkPackage: WP3
ePrint Archive: Report 2016/381
FHE Circuit Privacy Almost For Free
F. Bourse, R. del Pino, M. Minelli, H. Wee
Published in: Robshaw M., Katz J. (eds) Advances in Cryptology – CRYPTO 2016, Lecture Notes in Computer Science, Vol 9815. Springer-Verlag, 2016, pp. 62-89.
WorkPackage: WP2
ePrint Archive: Report 2016/156
More Efficient Constant-Round Multi-party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, and Eduardo Soria-Vazquez
Published in: Hirt M., Smith A. (eds) Theory of Cryptography - TCC 2016, Lecture Notes in Computer Science, Vol 9985. Springer-Verlag, 2016, pp. 554-581.
WorkPackage: WP2
ePrint Archive: Report 2016/841
A Methodology for the Characterisation of Leakages in Combinatorial Logic
G.Bertoni, M. Martinoli
Published in: Carlet C., Hasan M., Saraswat V. (eds) Security, Privacy and Applied Cryptographic Engineering - SPACE 2016, Lecture Notes in Computer Science, Vol. 10076. Springer-Verlag, 2016, pp. 363-382.
WorkPackage: WP3
pdf of paper
Hold Your Breath, PRIMATEs Are Lightweight
D. Sijacic, A. B. Kidmose, B. Yang, S. Banik, B. Bilgin, A. Bogdanov, and I. Verbauwhede
Published in: Selected Areas in Cryptography - SAC 2016, Lecture Notes in Computer Science, Springer-Verlag, 17 pages, to appear.
WorkPackage: WP3
pdf of paper
Security of BLS and BGLS signatures in a multi-user setting
Marie-Sarah Lacharité
Presented at: ArcticCrypt 2016, Longyearbyen, Svalbard, Norway, 17-22 July 2016.
Submitted to: the journal Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences.
WorkPackage: WP2
ePrint Archive: Report 2016/740
Software Benchmarking of the 2nd round CAESAR Candidates
Ralph Ankele and Robin Ankele
Presented at: Directions in Authenticated Ciphers - DIAC 2016, Nagoya, Japan, 25-27 September 2016.
WorkPackage: WP1
ePrint Archive: Report 2017/195
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li and Qingju Wang
Published in: IACR Transactions on Symmetric Cryptology 2(1), pp. 129-155, 2017.
Presented at: Fast Software Encryption 2017, Tokyo, Japan, 5-8 March, 2017.
WorkPackage: WP1
pdf of paper
A Note of 5-bit Quadratic Permutations' Classification
Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
Published in: IACR Transactions on Symmetric Cryptology 2(1), pp. 398-404, 2017.
WorkPackage: WP1
ePrint Archive: Report 2017/288
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim, Claudio Orlandi and Răzvan Roşie
Published in: IACR Transactions on Symmetric Cryptology 2(1), pp. 449-473, 2017.
Presented at: Fast Software Encryption 2017, Tokyo, Japan, 5-8 March, 2017.
WorkPackage: WP1
ePrint Archive: Report 2017/404
Short Generators Without Quantum Computers: The Case of Multiquadratics
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Published in: Jean-Sébastien Coron, Jesper Buus Nielsen (eds) Advances in Cryptology – EUROCRYPT 2017, Lecture Notes in Computer Science, Vol. 10210. Springer-Verlag, 2017, pp. 27-59.
WorkPackage: WP2
ePrint Archive: Report 2016/1127
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim and Gaoli Wang
Accepted at: 15th International Conference on Applied Cryptography and Network Security (ACNS2017), 10-12 July 2017, Kanazawa, Japan.
Published in: Gollmann D., Miyaji, A., Kikuchi H. (eds) Applied Cryptography and Network Security - ACNS 2017, Lecture Notes in Computer Science, Vol. 10355, Springer-Verlag, to appear.
WorkPackage: WP1
ePrint Archive: Report 2017/378
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez and Srinivas Vivek
Accepted at: 15th International Conference on Applied Cryptography and Network Security (ACNS2017), 10-12 July 2017, Kanazawa, Japan.
Published in: Gollmann D., Miyaji, A., Kikuchi H. (eds) Applied Cryptography and Network Security - ACNS 2017, Lecture Notes in Computer Science, Vol. 10355, Springer-Verlag, to appear.
WorkPackage: WP2
ePrint Archive: Report 2016/986
Fast Arithmetic Modulo 2xpy±1
Joppe W. Bos and Simon Friedberger
Published in: Proceedings of the 24th IEEE Symposium on Computer Arithmetic (ARITH 24), London, UK, 24-26 July 2017.
WorkPackage: WP1
ePrint Archive: Report 2017/214
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Carmit Hazay, Peter Scholl and Eduardo Soria-Vazquez
Under submission
WorkPackage: WP2

This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No. 643161.

H2020

Project reference: 643161
Start date: 01-03-2015
End date: 28-02-2019
Duration: 48 months

Project funding: € 3.893.200
Programme: H2020
Call: H2020-MSCA-ITN-2014
Action: Training Networks