skip to main content
10.1145/3178291acmotherconferencesBook PagePublication Pagescs2Conference Proceedingsconference-collections
CS2 '18: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CS2 '18: Fifth Workshop on Cryptography and Security in Computing Systems Manchester United Kingdom 24 January 2018
ISBN:
978-1-4503-6374-7
Published:
24 January 2018
In-Cooperation:
HiPEAC

Bibliometrics
Skip Abstract Section
Abstract

Each anonymously submitted paper was reviewed by at least three members of the program committee, who did not have any conict of interest with the authors of the paper, and was evaluated for significance, novelty, technical quality, and its potential to spark interesting discussions among attendees from the academic and industry research communities. The program committee's work was carried out electronically, and where needed, additional reviews were solicited. The final acceptance decision was made by consensus reaching consensus among the reviewers. Of the submitted papers, the program committee accepted 2 full papers and 1 short paper which were presented at the workshop together with two invited talks and a keynote speech, of which the abstracts are included in the proceedings.

Skip Table Of Content Section
research-article
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication

This paper proposes a new multiplication algorithm over F2255_19 where the de-facto standard Curve25519 [2] algorithm is based on. Our algorithm for the underlying finite field multiplication exploits the Toeplitz matrix-vector multiplication and ...

research-article
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks

The future advent of quantum computer pushes for the design and implementation of public-key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography, especially when implemented over ideal lattices, is one of the most promising ...

short-paper
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Last years have seen the growth of interest for Middleware (MW) exploitation in distributed resource-constrained systems like Wireless Sensor Networks (WSN). Available MW platforms usually provide an Application Layer (AL) with different basic services ...

abstract
Automotive Cyber Security: Lessons Learned and Research Challenges

The automotive industry is undergoing a major transformation process where everything from the car key to the vehicle diagnostics is becoming digital. Modern vehicles have several wireless interfaces, and are interconnected with various consumer devices,...

abstract
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM

This talk will provide an overview and an outlook to the future of rev.ng [1-3], a binary analysis tools based on QEMU and LLVM. Thanks to QEMU, and unlike many other binary analysis tools, rev.ng can handle a very large number of diverse architectures ...

Contributors
  • The University of Manchester
  • The University of Manchester
  • Politecnico di Milano
  • Politecnico di Milano
  • University of Massachusetts Amherst
  • Politecnico di Milano

Recommendations

Acceptance Rates

CS2 '18 Paper Acceptance Rate2of8submissions,25%Overall Acceptance Rate27of91submissions,30%
YearSubmittedAcceptedRate
CS2 '188225%
CS2 '1711436%
CS2 '16191053%
CS2 '1527519%
CS2 '1426623%
Overall912730%