Springer Nature Switzerland AG, 2019. — XI+499 p. — (Lecture Notes in Computer Science, 11349). — ISBN: 978-3-030-10970-7.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithmsmathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
(перевод описания)Эта книга содержит пересмотренные избранные документы 25-й Международной конференции по отдельным областям криптографии, SAC 2018, состоявшейся в Калгари, AB, Канада в августе 2018 года.
22 полных документа, представленных в этом томе, были тщательно рассмотрены и отобраны из 57 представленных материалов. Они охватывают следующие области исследований: проектирование и анализ симметричных ключевых примитивов и криптосистем, включая блочные и потоковые шифры, хэш-функции, алгоритмы MAC и аутентифицированные схемы шифрования, эффективные реализации алгоритмов симметричных и открытых ключей, математические и алгоритмические аспекты прикладной криптологии, криптографии для Интернет-торговли.
Organization
Design of Symmetric Key PrimitivesTargeted Ciphers for Format-Preserving Encryption
Sarah Miracle and Scott YilekVariants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, and Baptiste LambinAnalysis and Improvement of an Authentication Scheme in Incremental Cryptography
Louiza Khati and Damien VergnaudCryptanalysis of Symmetric Key PrimitivesIntegral Attacks on Round-Reduced Bel-T-256
Muhammad ElSheikh, Mohamed Tolba, and Amr M. YoussefCryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes
Yunwen Liu, Yu Sasaki, Ling Song, and Gaoli WangFinding Integral Distinguishers with Ease
Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, and Tyge TiessenTowards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu, Tingting Cui, Chao Gao, and Meiqin WangMind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele and Stefan KölblSide Channel and Fault AttacksSliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai WoolAssessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, and Martijn StamCache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis
Ben Lapid and Avishai WoolFault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig, Stefan Mangard, Florian Mendel, and Robert PrimasPost-Quantum CryptographyEFLASH: A New Multivariate Encryption Scheme
Ryann Cartor and Daniel Smith-TonePublic Key Compression for Constrained Linear Signature Schemes
Ward Beullens, Bart Preneel, and Alan SzepieniecOn the Cost of Computing Isogenies Between Supersingular Elliptic Curves
Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, and Francisco Rodríguez-HenríquezLattice-Based CryptographyA Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo SongAnalysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann, Thomas Pöppelmann, and Johanna SepulvedaProvably Secure NTRUEncrypt over Any Cyclotomic Field
Yang Wang and Mingqiang WangClassical Public Key CryptographyA Generalized Attack on Some Variants of the RSA Cryptosystem
Abderrahmane Nitaj, Yanbin Pan, and Joseph TonienInjective Encodings to Binary Ordinary Elliptic Curves
Mojtaba Fadavi, Reza Rezaeian Farashahi, and Soheila SabbaghianMachine Learning and CryptographyUnsupervised Machine Learning on Encrypted Data
Angela Jäschke and Frederik ArmknechtProfiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge
Benjamin Hettwer, Stefan Gehrer, and Tim GüneysuAuthor Index