Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
34
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,094
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security : 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
A White-Box Speck Implementation Using Self-equivalence Encodings
other
Author(s):
Joachim Vandersmissen
,
Adrián Ranea
,
Bart Preneel
Publication date
(Online):
June 18 2022
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
34
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear Cryptanalysis Method for DES Cipher
Mitsuru Matsui
(1994)
0
comments
Cited
113
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential fault analysis of secret key cryptosystems
Eli Biham
,
Adi Shamir
(1997)
0
comments
Cited
88
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Salsa20 Family of Stream Ciphers
Daniel J. Bernstein
(2008)
0
comments
Cited
26
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
June 18 2022
Pages
: 771-791
DOI:
10.1007/978-3-031-09234-3_38
SO-VID:
158b8b74-4234-4ef7-b670-c48d4fbec864
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
pp. 24
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
pp. 45
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
pp. 67
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
pp. 85
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
pp. 105
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
pp. 126
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
pp. 147
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
pp. 170
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
pp. 193
RSA Key Recovery from Digit Equivalence Information
pp. 212
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
pp. 230
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
pp. 253
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
pp. 273
Improving the Privacy of Tor Onion Services
pp. 293
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
pp. 313
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
pp. 337
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
pp. 356
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
pp. 376
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
pp. 399
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
pp. 419
Don’t Tamper with Dual System Encryption
pp. 440
Progressive and Efficient Verification for Digital Signatures
pp. 459
Revocable Hierarchical Attribute-Based Signatures from Lattices
pp. 480
Covert Authentication from Lattices
pp. 501
Spreading the Privacy Blanket:
pp. 521
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
pp. 542
(Commit-and-Prove) Predictable Arguments with Privacy
pp. 565
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
pp. 585
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
pp. 605
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
pp. 626
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
pp. 643
Efficient Two-Party Exponentiation from Quotient Transfer
pp. 663
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
pp. 684
How Byzantine is a Send Corruption?
pp. 707
Babel Fees via Limited Liabilities
pp. 727
FAST: Fair Auctions via Secret Transactions
pp. 748
Astrape: Anonymous Payment Channels with Boring Cryptography
pp. 771
A White-Box Speck Implementation Using Self-equivalence Encodings
pp. 792
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
pp. 809
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher
pp. 833
Carry-Less to BIKE Faster
pp. 853
Faster Kyber and Dilithium on the Cortex-M4
pp. 872
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
pp. 892
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Similar content
3,094
Wavelet-based frame video coding algorithms using fovea and SPECK
Authors:
O. Starostenko
,
J.C. Galan-Hernandez
,
Pilar Gomez-Gil
…
Duodenal Xanthoma: From Specks to Obstruction
Authors:
Sindhura Kolli
,
Dan Phan
,
Mel Ona
White specks in the esophageal mucosa: an endoscopic manifestation of non-reflux eosinophilic esophagitis in children
Authors:
JR Lim
,
SK Gupta
,
JM Croffie
…
See all similar