Each anonymously submitted paper was reviewed by at least three members of the program committee, who did not have any conict of interest with the authors of the paper, and was evaluated for significance, novelty, technical quality, and its potential to spark interesting discussions among attendees from the academic and industry research communities. The program committee's work was carried out electronically, and where needed, additional reviews were solicited. The final acceptance decision was made by consensus reaching consensus among the reviewers. Of the submitted papers, the program committee accepted 2 full papers and 1 short paper which were presented at the workshop together with two invited talks and a keynote speech, of which the abstracts are included in the proceedings.
Proceeding Downloads
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication
This paper proposes a new multiplication algorithm over F2255_19 where the de-facto standard Curve25519 [2] algorithm is based on. Our algorithm for the underlying finite field multiplication exploits the Toeplitz matrix-vector multiplication and ...
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks
The future advent of quantum computer pushes for the design and implementation of public-key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography, especially when implemented over ideal lattices, is one of the most promising ...
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks
- Luciano Bozzi,
- Lorenzo Di Giuseppe,
- Luigi Pomante,
- Marco Pugliese,
- Marco Santic,
- Fortunato Santucci,
- Walter Tiberti
Last years have seen the growth of interest for Middleware (MW) exploitation in distributed resource-constrained systems like Wireless Sensor Networks (WSN). Available MW platforms usually provide an Application Layer (AL) with different basic services ...
Automotive Cyber Security: Lessons Learned and Research Challenges
The automotive industry is undergoing a major transformation process where everything from the car key to the vehicle diagnostics is becoming digital. Modern vehicles have several wireless interfaces, and are interconnected with various consumer devices,...
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM
This talk will provide an overview and an outlook to the future of rev.ng [1-3], a binary analysis tools based on QEMU and LLVM. Thanks to QEMU, and unlike many other binary analysis tools, rev.ng can handle a very large number of diverse architectures ...
Index Terms
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems



