Зарегистрироваться
Восстановить пароль
FAQ по входу

Cid C., Jacobson M.J. Jr. (Eds.) Selected Areas in Cryptography - SAC 2018

  • Файл формата pdf
  • размером 7,87 МБ
  • Добавлен пользователем
  • Описание отредактировано
Cid C., Jacobson M.J. Jr. (Eds.) Selected Areas in Cryptography - SAC 2018
Springer Nature Switzerland AG, 2019. — XI+499 p. — (Lecture Notes in Computer Science, 11349). — ISBN: 978-3-030-10970-7.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithmsmathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
(перевод описания)
Эта книга содержит пересмотренные избранные документы 25-й Международной конференции по отдельным областям криптографии, SAC 2018, состоявшейся в Калгари, AB, Канада в августе 2018 года.
22 полных документа, представленных в этом томе, были тщательно рассмотрены и отобраны из 57 представленных материалов. Они охватывают следующие области исследований: проектирование и анализ симметричных ключевых примитивов и криптосистем, включая блочные и потоковые шифры, хэш-функции, алгоритмы MAC и аутентифицированные схемы шифрования, эффективные реализации алгоритмов симметричных и открытых ключей, математические и алгоритмические аспекты прикладной криптологии, криптографии для Интернет-торговли.
Organization
Design of Symmetric Key Primitives
Targeted Ciphers for Format-Preserving Encryption
Sarah Miracle and Scott Yilek
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, and Baptiste Lambin
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
Louiza Khati and Damien Vergnaud
Cryptanalysis of Symmetric Key Primitives
Integral Attacks on Round-Reduced Bel-T-256
Muhammad ElSheikh, Mohamed Tolba, and Amr M. Youssef
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes
Yunwen Liu, Yu Sasaki, Ling Song, and Gaoli Wang
Finding Integral Distinguishers with Ease
Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, and Tyge Tiessen
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu, Tingting Cui, Chao Gao, and Meiqin Wang
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele and Stefan Kölbl
Side Channel and Fault Attacks
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai Wool
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, and Martijn Stam
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis
Ben Lapid and Avishai Wool
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig, Stefan Mangard, Florian Mendel, and Robert Primas
Post-Quantum Cryptography
EFLASH: A New Multivariate Encryption Scheme
Ryann Cartor and Daniel Smith-Tone
Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens, Bart Preneel, and Alan Szepieniec
On the Cost of Computing Isogenies Between Supersingular Elliptic Curves
Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, and Francisco Rodríguez-Henríquez
Lattice-Based Cryptography
A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann, Thomas Pöppelmann, and Johanna Sepulveda
Provably Secure NTRUEncrypt over Any Cyclotomic Field
Yang Wang and Mingqiang Wang
Classical Public Key Cryptography
A Generalized Attack on Some Variants of the RSA Cryptosystem
Abderrahmane Nitaj, Yanbin Pan, and Joseph Tonien
Injective Encodings to Binary Ordinary Elliptic Curves
Mojtaba Fadavi, Reza Rezaeian Farashahi, and Soheila Sabbaghian
Machine Learning and Cryptography
Unsupervised Machine Learning on Encrypted Data
Angela Jäschke and Frederik Armknecht
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge
Benjamin Hettwer, Stefan Gehrer, and Tim Güneysu
Author Index
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация