Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2024
Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests
Applied Cryptography and Network Security WorkshopsPages 303–318https://doi.org/10.1007/978-3-031-61486-6_18AbstractIn this paper, we present the optimization of the AES-256-GCM encryption algorithm for high-speed security solutions based on Field Programmable Gate Arrays (FPGA). We discuss strategies and techniques to achieve the perfect balance between ...
- research-articleAugust 2023
On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 131, Pages 1–10https://doi.org/10.1145/3600160.3605038As quantum-safe algorithms are increasingly implemented in security protocols used in current and emerging digital services, there is also a corresponding need to map the current state of security protocols and applications and their preparedness for the ...
- research-articleAugust 2023
Curricula Designer with Enhanced ECSF Analysis
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 63, Pages 1–7https://doi.org/10.1145/3600160.3604987In late 2022, the novel European Cybersecurity Skills Framework (ECSF) was officially released by the European Union Agency for Cybersecurity (ENISA). It aims to connect cybersecurity education and training with practical needs of the job market. In ...
- research-articleAugust 2022
On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 144, Pages 1–9https://doi.org/10.1145/3538969.3544423Currently, many post-quantum cryptography schemes have been implemented on various hardware platforms in order to provide efficient solutions in cybersecurity services. As researchers and hardware developers focus primarily on designs providing small ...
- research-articleAugust 2022
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 141, Pages 1–9https://doi.org/10.1145/3538969.3543803With the daily increase in digitalization and integration of the physical and digital worlds, we need to better protect users’ privacy and identity. Attribute-based Credentials (ABCs) seem to be a promising technology for this task. In this paper, we ...
-
- research-articleAugust 2022
Security of Smart Grid Networks in the Cyber Ranges
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 80, Pages 1–8https://doi.org/10.1145/3538969.3543801Smart meters are increasingly a part of everyday households. These smart meters allow remote reading of the energy but also remote disconnection of the point of consumption from the energy supply. As these devices are part of the critical ...
- research-articleAugust 2022
Adding European Cybersecurity Skills Framework into Curricula Designer
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 82, Pages 1–6https://doi.org/10.1145/3538969.3543799We present the updated version of the Curricula Designer, a tool that is devoted to helping study program administrators and education providers to create cybersecurity curricula that are modern and reflect the needs of the job market. Our main ...
- research-articleAugust 2022
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 140, Pages 1–8https://doi.org/10.1145/3538969.3543798Java Card stands out as a good choice for the development of smart card applications due to the high interoperability between different manufacturers, its security, and wide support of cryptographic algorithms. Despite extensive cryptographic support, ...
- research-articleAugust 2021
Secret Sharing-based Authenticated Key Agreement Protocol
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 152, Pages 1–10https://doi.org/10.1145/3465481.3470057In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even on constrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge ...
- research-articleAugust 2021
PESTLE Analysis of Cybersecurity Education
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 142, Pages 1–8https://doi.org/10.1145/3465481.3469184Cybersecurity is a vital part of digital economies and digital governing but the discipline is suffering from a pronounced skills shortage. Nevertheless, the reasons for the inability of academia to produce enough graduates with the skills that reflect ...
- research-articleAugust 2021
Cybersecurity Curricula Designer
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 144, Pages 1–7https://doi.org/10.1145/3465481.3469183The paper aims at minimizing the skills gaps and skills shortages on the cybersecurity job market by empowering education and training institutions during the process of creation of new cybersecurity study programs. We provide a complex cybersecurity ...
- research-articleAugust 2021
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
- Sara Ricci,
- Lukas Malina,
- Petr Jedlicka,
- David Smékal,
- Jan Hajny,
- Peter Cibik,
- Petr Dzurenda,
- Patrik Dobias
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 1, Pages 1–11https://doi.org/10.1145/3465481.3465756In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). ...
- ArticleNovember 2020
Hardware-Accelerated Cryptography for Software-Defined Networks with P4
Innovative Security Solutions for Information Technology and CommunicationsPages 271–287https://doi.org/10.1007/978-3-030-69255-1_18AbstractThe paper presents a hardware-accelerated cryptographic solution for Field Programmable Gate Array (FPGA) based network cards that provide throughput up to 200 Gpbs. Our solution employs a Software-Defined Network (SDN) concept based on the high-...
- ArticleDecember 2019
A Privacy-Enhancing Framework for Internet of Things Services
AbstractThe world has seen an influx of connected devices through both smart devices and smart cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent infrastructures and applications based on IoT can be beneficial to ...
- research-articleAugust 2019
A Secure Publish/Subscribe Protocol for Internet of Things
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityArticle No.: 75, Pages 1–10https://doi.org/10.1145/3339252.3340503The basic concept behind the emergence of Internet of Things (IoT) is to connect as many objects to the Internet as possible in an attempt to make our lives better in some way. However, connecting everyday objects like your car or house to the Internet ...
- research-articleAugust 2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
Computers and Security (CSEC), Volume 77, Issue CPages 500–513https://doi.org/10.1016/j.cose.2018.05.006AbstractThe authentication schemes based on common chip cards such as Mifare cards are still very popular and are used in various access control systems deployed in critical infrastructure sectors, universities, companies, libraries, hospitals,...
- short-paperJanuary 2018
200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards
ASHES '18: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware SecurityPages 11–17https://doi.org/10.1145/3266444.3266446We present the architecture and implementation of our encryption system designed for 200 Gbps FPGA (Field Programmable Gate Array) network cards utilizing the IPsec (IP security) protocol. To our knowledge, our hardware encryption system is the first ...
- research-articleJanuary 2018
Multidevice Authentication with Strong Privacy Protection
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily ...
- research-articleOctober 2016
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs
WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic SocietyPages 123–133https://doi.org/10.1145/2994620.2994625We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based credentials (PABCs) that is practically usable in large-scale applications, such as national eID cards, public transportation and physical access control ...
- ArticleJuly 2016
Multi-Device Authentication using Wearables and IoT
ICETE 2016: Proceedings of the 13th International Joint Conference on e-Business and TelecommunicationsPages 483–488https://doi.org/10.5220/0006000004830488The paper presents a novel cryptographic authentication scheme that makes use of the presence of electronic devices around users. The scheme makes authentication more secure by involving devices that are usually worn by users (such as smart-watches, ...