![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessThe ASHES 2021 special issue at JCEN
This brief editorial gives a short, two-page overview of the ASHES 2021 workshop. It shall serve as an introduction for this special issue at JCEN.
-
Article
Open AccessThe ASHES 2020 special issue at JCEN
This editorial provides its readers with a brief introductory overview of the ASHES workshop series in general, and of this special ASHES 2020 issue at the Journal of Cryptographic Engineering (JCEN) in partic...
-
Article
Open AccessELSA: efficient long-term secure storage of large datasets (full version) ∗
An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...
-
Article
Open AccessLong-term integrity protection of genomic data
Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...
-
Chapter and Conference Paper
Towards Practical RAM Based Secure Computation
Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...
-
Chapter and Conference Paper
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
A major challenge in computer security is about establishing the trustworthiness of remote platforms. Remote attestation is the most common approach to this challenge. It allows a remote platform to measure an...
-
Chapter and Conference Paper
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
Mesh networked low-end embedded devices are increasingly used in various scenarios, including industrial control, wireless sensing, robot swarm communication, or building automation. Recently, more and more so...
-
Chapter and Conference Paper
Compiling Low Depth Circuits for Practical Secure Computation
With the rise of practical Secure Multi-party Computation (MPC) protocols, compilers have been developed that create Boolean or Arithmetic circuits for MPC from functionality descriptions in a high-level langu...
-
Chapter and Conference Paper
Run-Time Accessible DRAM PUFs in Commodity Devices
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, which emerges due to variations in the fabrication processes. Prior works have demonstrated that PU...
-
Chapter and Conference Paper
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations
Secure two-party computation (STC) is a computer security paradigm where two parties can jointly evaluate a program with sensitive input data, provided in parts from both parties. By the security guarantees of...
-
Chapter and Conference Paper
General Impossibility of Group Homomorphic Encryption in the Quantum World
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or sec...
-
Chapter and Conference Paper
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Since JPEG is the most widely used compression standard, detection of forgeries in JPEG images is necessary. In order to create a forged JPEG image, the image is usually loaded into a photo editing software, m...
-
Chapter and Conference Paper
Robust Resampling Detection in Digital Images
To create convincing forged images, manipulated images or parts of them are usually exposed to some geometric operations which require a resampling step. Therefore, detecting traces of resampling became an imp...
-
Chapter and Conference Paper
Detecting Computer Worms in the Cloud
Computer worms are very active and new sophisticated versions continuously appear. Signature-based detection methods work with a low false-positive rate, but previously knowledge about the threat is needed. An...
-
Chapter and Conference Paper
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security fea...
-
Chapter and Conference Paper
Recyclable PUFs: Logically Reconfigurable PUFs
We introduce the concept of Logically Reconfigurable Physical Unclonable Functions (LR-PUFs). In contrast to classical Physically Unclonable Functions (PUFs) LR-PUFs can be dynamically ‘reconfigured’ after dep...
-
Chapter and Conference Paper
Physically Uncloneable Functions in the Universal Composition Framework
Recently, there have been numerous works about hardwareassisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions...
-
Chapter and Conference Paper
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
In this paper we propose an architecture which combines watermarking with traditional cryptographic key agreement protocols to establish an authenticated or encrypted channel in teleconferencing systems. Techn...
-
Chapter and Conference Paper
Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for trees which support public redaction of subtrees (by third-party distributors) while pertaining the integrity of the rema...
-
Chapter and Conference Paper
Hide and Seek in Time — Robust Covert Timing Channels
Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Previous results used encoding mechanisms...