Filter
Conference contribution

Search results

  • 2025

    Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted Data: – Short Paper –

    Drucker, N. & Gueron, S., 2025, Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Proceedings. Dolev, S., Elhadad, M., Kutyłowski, M. & Persiano, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 92-99 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15349 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    A New Interpretation for the GHASH Authenticator of AES-GCM

    Gueron, S., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 424-438 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Counter Mode for Long Messages and a Long Nonce

    Gueron, S., 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 224-231 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • How to Abuse and Fix Authenticated Encryption Without Key Commitment

    Albertini, A., Duong, T., Gueron, S., Kölbl, S., Luykx, A. & Schmieg, S., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 3291-3308 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Binding BIKE Errors to a Key Pair

    Drucker, N., Gueron, S. & Kostic, D., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 275-281 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Revisiting the Security of COMET Authenticated Encryption Scheme

    Gueron, S., Jha, A. & Nandi, M., 2021, Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings. Adhikari, A., Küsters, R. & Preneel, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13143 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speed Up Over the Rainbow

    Drucker, N., Gueron, S. & Latifi, S. (Editor), 2021, ITNG 2021 18th International Conference on Information Technology-New Generations. p. 131-136 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography

    Drucker, N., Gueron, S. & Kostic, D., 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 110-127 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Observations on the Performance of PQ KEMs

    Drucker, N. & Gueron, S., 2020, 17th International Conference on Information Technology–New Generations, ITNG 2020. Latifi, S. (ed.). Springer, p. 25-30 6 p. (Advances in Intelligent Systems and Computing; vol. 1134).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On Constant-Time QC-MDPC decoders with negligible failure rate

    Drucker, N., Gueron, S. & Kostic, D., 2020, Code-Based Cryptography - 8th International Workshop, CBCrypto 2020, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (eds.). Springer, p. 50-79 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12087 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • QC-MDPC Decoders with Several Shades of Gray

    Drucker, N., Gueron, S. & Kostic, D., 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J.-P. (eds.). Springer, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Continuous key agreement with reduced bandwidth

    Drucker, N. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast constant time implementations of ZUC-256 on x86 CPUs

    Drucker, N. & Gueron, S., 25 Feb 2019, 2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019. Institute of Electrical and Electronics Engineers Inc., 8651851. (2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast modular squaring with AVX512IFMA

    Drucker, N. & Gueron, S., 2019, 16th International Conference on Information Technology-New Generations, ITNG 2019. Latif, S. (ed.). Springer, p. 3-8 6 p. (Advances in Intelligent Systems and Computing; vol. 800 Part F1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Generating a random string with a fixed weight

    Drucker, N. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 141-155 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Making AES great again: The forthcoming vectorized AES instruction

    Drucker, N., Gueron, S. & Krasnov, V., 2019, 16th International Conference on Information Technology-New Generations, ITNG 2019. Latif, S. (ed.). Springer, p. 37-41 5 p. (Advances in Intelligent Systems and Computing; vol. 800 Part F1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the Security of COMET Authenticated Encryption Scheme

    Gueron, S., Jha, A. & Nandi, M., 2019, NIST Lightweight Workshop ’19. (Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The advantage of truncated permutations

    Gilboa, S. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 111-120 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using the New VPMADD Instructions for the New Post Quantum Key Encapsulation Mechanism SIKE

    Kostic, D. & Gueron, S., Jun 2019, Proceedings - 26th IEEE Symposium on Computer Arithmetic, ARITH 2019. Takagi, N., Boldo, S. & Langhammer, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 215-218 4 p. 8877440. (Proceedings - Symposium on Computer Arithmetic; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Cryptosystems with a multi prime composite modulus

    Gueron, S. & Drucker, N., 16 Mar 2018, CCNC 2018 - 2018 15th IEEE Annual Consumer Communications and Networking Conference. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction

    Drucker, N., Gueron, S. & Krasnov, V., 13 Sep 2018, Proceedings of the 25th International Symposium on Computer Arithmetic, ARITH 2018. Institute of Electrical and Electronics Engineers Inc., p. 115-119 5 p. 8464777. (Proceedings - Symposium on Computer Arithmetic; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Software Optimizations for DES

    Gueron, S. & Shemy, R., 2018, Information Technology - New Generations - 15th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 133-138 6 p. (Advances in Intelligent Systems and Computing; vol. 738).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The Comeback of Reed Solomon Codes

    Drucker, N., Gueron, S. & Krasnov, V., 13 Sep 2018, Proceedings of the 25th International Symposium on Computer Arithmetic, ARITH 2018. Institute of Electrical and Electronics Engineers Inc., p. 125-129 5 p. 8464690. (Proceedings - Symposium on Computer Arithmetic; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Two are better than one: Software optimizations for AES-GCM over short messages

    Gueron, S. & Shemy, R., 2018, Information Technology – New Generations - 14th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 187-191 5 p. (Advances in Intelligent Systems and Computing; vol. 558).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Better bounds for block cipher modes of operation via nonce-based key derivation

    Gueron, S. & Lindell, Y., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1019-1036 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • CAKE: Code-Based Algorithm for Key Encapsulation

    Barreto, P. S. L. M., Gueron, S., Güneysu, T., Misoczki, R., Persichetti, E., Sendrier, N. & Tillich, J. P., 2017, Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings. O’Neill, M. (ed.). Springer Verlag, p. 207-226 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Combining homomorphic encryption with trusted execution environment: A demonstration with paillier encryption and SGX

    Drucker, N. & Gueron, S., 30 Oct 2017, MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 85-88 4 p. (MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fault attacks on encrypted general purpose compute platforms

    Buhren, R., Gueron, S., Nordholz, J., Seifert, J. P. & Vetter, J., 22 Mar 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 197-204 8 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Paillier-encrypted databases with fast aggregated queries

    Drucker, N. & Gueron, S., 17 Jul 2017, 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017. Institute of Electrical and Electronics Engineers Inc., p. 848-853 6 p. 7983244. (2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    Accelerating Big Integer Arithmetic Using Intel IFMA Extensions

    Gueron, S. & Krasnov, V., 7 Sep 2016, Proceedings - 2016 IEEE 23rd Symposium on Computer Arithmetic, ARITH 2016. Hormigo, J., Revol, N., Montuschi, P., Oberman, S. & Schulte, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 32-38 7 p. 7563269. (Proceedings - Symposium on Computer Arithmetic; vol. 2016-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Attacks on Encrypted Memory and Constructions for Memory Protection

    Gueron, S., 5 Dec 2016, Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016. Maurine, P. & Tunstall, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1-3 3 p. 7774476. (Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Blinded random corruption attacks

    Branco, R. & Gueron, S., 20 Jun 2016, Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7495562. (Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hardware Implementation of AES Using Area-Optimal Polynomials for Composite-Field Representation GF(24)2 of GF(28)

    Gueron, S. & Mathew, S., 7 Sep 2016, Proceedings - 2016 IEEE 23rd Symposium on Computer Arithmetic, ARITH 2016. Hormigo, J., Revol, N., Montuschi, P., Oberman, S. & Schulte, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-117 6 p. 7563279. (Proceedings - Symposium on Computer Arithmetic; vol. 2016-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Simpira v2: A family of efficient permutations using the AES round function

    Gueron, S. & Mouha, N., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer Verlag, p. 95-125 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Software optimizations of NTRUEncrypt for modern processor architectures

    Gueron, S. & Schlieker, F., 2016, Information Technology: New Generations - 13th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 189-199 11 p. (Advances in Intelligent Systems and Computing; vol. 448).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speeding up R-LWE post-quantum key exchange

    Gueron, S. & Schlieker, F., 2016, Secure IT Systems - 21st Nordic Conference, NordSec 2016, Proceedings. Roning, J. & Brumley, B. B. (eds.). Springer Verlag, p. 187-198 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10014 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speed records for multi-prime RSA using AVX2 architectures

    Gueron, S. & Krasnov, V., 2016, Information Technology: New Generations - 13th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 237-245 9 p. (Advances in Intelligent Systems and Computing; vol. 448).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using scan side channel for detecting IP theft

    Azriel, L., Ginosar, R., Gueron, S. & Mendelson, A., 18 Jun 2016, Hardware and Architectural Support for Security and Privacy, HASP 2016. Association for Computing Machinery, p. 1-8 2948619. (ACM International Conference Proceeding Series; vol. 18-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    Fast garbling of circuits under standard assumptions

    Gueron, S., Lindell, Y., Nof, A. & Pinkasy, B., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 567-578 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • GCM-SIV: Full nonce misuse-resistant authenticated encryption at under one cycle per byte

    Gueron, S. & Lindell, Y., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 109-119 11 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Vectorization of Poly1305 Message Authentication Code

    Goll, M. & Gueron, S., 26 May 2015, Proceedings - 12th International Conference on Information Technology: New Generations, ITNG 2015. Latifi, S., Arai, K., Carneiro, G., Debnath, N., Vieira Dias, L. A., Hashemi, R., Minamoto, T., Reddy, Y., Saleem, K., Shen, F. & Thuemmler, C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7113463. (Proceedings - 12th International Conference on Information Technology: New Generations, ITNG 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Speeding up counter mode in software and hardware

    Gueron, S. & Krasnov, V., 2014, ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations. IEEE Computer Society, p. 338-340 3 p. 6822220. (ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The fragility of AES-GCM authentication algorithm

    Gueron, S. & Krasnov, V., 2014, ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations. IEEE Computer Society, p. 333-337 5 p. 6822219. (ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Vectorization on ChaCha stream cipher

    Goll, M. & Gueron, S., 2014, ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations. IEEE Computer Society, p. 612-615 4 p. 6822267. (ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2013

    Innovative Technology for CPU Based Attestation and Sealing

    Anati, I., Gueron, S., Johnson, S. & Scarlata, V., 2013, HASP '13: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. p. 7

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • White box AES using Intel's new AES instructions

    Gueron, S., 2013, Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013. p. 417-421 5 p. 6614343. (Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Software implementation of modular exponentiation, using advanced vector instructions architectures

    Gueron, S. & Krasnov, V., 2012, Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Proceedings. p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speeding up big-numbers squaring

    Gueron, S. & Krasnov, V., 2012, Proceedings of the 9th International Conference on Information Technology, ITNG 2012. p. 821-823 3 p. 6209072. (Proceedings of the 9th International Conference on Information Technology, ITNG 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speeding up SHA-1, SHA-256 and SHA-512 on the 2 nd generation Intel® Core™ processors

    Gueron, S., 2012, Proceedings of the 9th International Conference on Information Technology, ITNG 2012. p. 824-826 3 p. 6209073. (Proceedings of the 9th International Conference on Information Technology, ITNG 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Quick verification of RSA signatures

    Gueron, S., 2011, Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011. IEEE Computer Society, p. 382-386 5 p. 5945265. (Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review