skip to main content
10.1145/2694805acmotherconferencesBook PagePublication Pagescs2Conference Proceedingsconference-collections
CS2 '15: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CS2 '15: Second Workshop on Cryptography and Security in Computing Systems Amsterdam Netherlands January 19 - 21, 2015
ISBN:
978-1-4503-3187-6
Published:
19 January 2015

Reflects downloads up to 19 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

On behalf of the program and organizing committees, it is a great pleasure to welcome you to the Second Workshop on Cryptography and Security in Computing Systems (CS2 2015). The CS2 meeting is a co-located event with HiPEAC 2015 in Amsterdam, Netherlands, January 19, 2015.

Skip Table Of Content Section
research-article
Evaluation Tools for Multivariate Side-Channel Analysis

The goal of side-channel evaluation is to estimate the vulnerability of an implementation against the most powerful attacks. In this paper, we present a closed equation for the success rate computation in a profiling-based side-channel analysis ...

research-article
A new Definition and Classification of Physical Unclonable Functions

A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is

1. meant to impede the duplication of ...

research-article
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis

Efficient and high-throughput designs of hash functions will be in great demand in the next few years, given that every IPv6 data packet is expected to be handled with some kind of security features.

In this paper, pipelined implementations of the new ...

research-article
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography

In this work, the efficiency of embedded devices when operating as cryptographic accelerators is assessed, exploiting both multithreading and Single Instruction Multiple Data (SIMD) parallelism. The latency of a single modular multiplication is reduced, ...

research-article
Evidence of an information leakage between logically independent blocks

In this paper we study the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new attack path to retrieve secret information. First, an aes-128 has been implemented on a fpga ...

short-paper
On Continuous After-the-Fact Leakage-Resilient Key Exchange

Recently, the Continuous After-the-Fact Leakage (CAFL) security model has been introduced for two-party authenticated key exchange (AKE) protocols. In the CAFL model, an adversary can adaptively request arbitrary leakage of long-term secrets even after ...

short-paper
Interest of MIA in frequency domain?

Mutual Information Analysis (MIA) has a main advantage over Pearson's correlation Analysis (CPA): its ability in detecting any kind of leakage within traces. However, it remains rarely used and less popular than CPA; probably because of two reasons. The ...

short-paper
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA

Physical implementations have significant impacts to the security level of hardware cryptography, mainly due to the fact that the bottom-layer logic fundamentals typically act as the exploitable SCA leakage sources. As a widely studied countermeasure ...

short-paper
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication

In this paper, a road-map toward Fault (FA) and Power Analysis Attack (PA) resistance is proposed that combines the Edwards Curves innate PA resistance and a base point randomization Montgomery Power Ladder point multiplication (PM) algorithm, capable ...

Contributors
  • Politecnico di Milano
  • University of Massachusetts Amherst
  • Politecnico di Milano
  • Politecnico di Milano

Recommendations

Acceptance Rates

CS2 '15 Paper Acceptance Rate 5 of 27 submissions, 19%;
Overall Acceptance Rate 27 of 91 submissions, 30%
YearSubmittedAcceptedRate
CS2 '188225%
CS2 '1711436%
CS2 '16191053%
CS2 '1527519%
CS2 '1426623%
Overall912730%