index - Information Security Theory and Practice Access content directly
   


Full Text Documents

16

Search



Table of Contents
Information Security Theory and Practice
Maryline Laurent, Thanassis Giannetsos
Front Matter

Invited Paper


How to Compartment Secrets
Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
3-11

Authentication


A Lattice-Based Enhanced Privacy ID
Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
15-31
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications
Diana Maimuţ, George Teşeleanu
32-46

Cryptography


Verifiable and Private Oblivious Polynomial Evaluation
Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade
49-65
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations
Simon Landry, Yanis Linge, Emmanuel Prouff
66-84
Strong Designated Verifier Signature Based on the Rank Metric
Hafsa Assidi, El Mamoun Souidi
85-102
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things
Hao Cheng, Daniel Dinu, Johann Großschädl, Peter Rønne, Peter Ryan
103-119

Threats


Fault Injection Characterization on Modern CPUs: From the ISA to the Micro-Architecture
Thomas Trouchkine, Guillaume Bouffard, and Jessy Clédière
123-138
Threat Analysis of Poisoning Attack Against Ethereum Blockchain
Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote
139-154
A Template-Based Method for the Generation of Attack Trees
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Shaikh, Fengjun Zhou
155-165

Cybersecurity


Analysis of QUIC Session Establishment and Its Implementations
Eva Gagliardi and Olivier Levillain
169-184
CompactFlow: A Hybrid Binary Format for Network Flow Data
Michal Piskozub, Riccardo Spolaor, Ivan Martinovic
185-201
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities
Philipp Jakubeit, Albert Dercksen, Andreas Peter
202-219

Internet of Things


Automated Security Analysis of IoT Software Updates
Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando, Alessio Merlo
223-239
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief and Karim Samaké
240-252

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/