CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_15
J. Heather, C. Culnane, Steve A. Schneider, S. Srinivasan, Zhe Xia
{"title":"Solving the Discrete Logarithm Problem for Packing Candidate Preferences","authors":"J. Heather, C. Culnane, Steve A. Schneider, S. Srinivasan, Zhe Xia","doi":"10.1007/978-3-642-40588-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_15","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_20
W. Boehmer
{"title":"How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function","authors":"W. Boehmer","doi":"10.1007/978-3-642-40588-4_20","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_20","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_22
Suliman A. Alsuhibany, Ahmad Alonaizi, C. Morisset, Chris Smith, A. Moorsel
{"title":"Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms","authors":"Suliman A. Alsuhibany, Ahmad Alonaizi, C. Morisset, Chris Smith, A. Moorsel","doi":"10.1007/978-3-642-40588-4_22","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_22","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_6
A. A. Kamal, Roger Zahno, A. Youssef
{"title":"A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images","authors":"A. A. Kamal, Roger Zahno, A. Youssef","doi":"10.1007/978-3-642-40588-4_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_6","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_5
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, K. Yokoyama, Takeshi Koshiba
{"title":"Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics","authors":"Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, K. Yokoyama, Takeshi Koshiba","doi":"10.1007/978-3-642-40588-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_5","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_19
Thomas Schaberreiter, S. Varrette, P. Bouvry, J. Röning, D. Khadraoui
{"title":"Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project","authors":"Thomas Schaberreiter, S. Varrette, P. Bouvry, J. Röning, D. Khadraoui","doi":"10.1007/978-3-642-40588-4_19","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_19","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_7
Xuyun Nie, Albrecht Petzoldt, J. Buchmann
{"title":"Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method","authors":"Xuyun Nie, Albrecht Petzoldt, J. Buchmann","doi":"10.1007/978-3-642-40588-4_7","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_7","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CD-ARES WorkshopsPub Date : 2013-09-02DOI: 10.1007/978-3-642-40588-4_1
Jiageng Chen, A. Miyaji
{"title":"Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock","authors":"Jiageng Chen, A. Miyaji","doi":"10.1007/978-3-642-40588-4_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40588-4_1","url":null,"abstract":"","PeriodicalId":229596,"journal":{"name":"CD-ARES Workshops","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}