Selected Areas in Cryptography -- SAC 2013
The Realm of the Pairings.- A Three-Level Sieve Algorithm for the Shortest Vector Problem.- Improvement and Efficient Implementation of a Lattice-based Signature Scheme.- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.- Practical approaches to varying network size in combinatorial key pre distribution schemes.- Similarities between encryption and decryption: how far can we go.- A Group Action on Z p and the Generalized DLP with Auxiliary Inputs.- Solving a 6120-bit DLP on a Desktop Computer.- Stream ciphers and authenticated encryption How to Recover Any Byte of Plaintext on RC4.- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE.- AEGIS: A Fast Authenticated Encryption Algorithm.- Fast Exhaustive Search for Quadratic Systems in F2 on FPGAs.- Faster Hash-based Signatures with Bounded Leakage.- White-Box Security Notions for Symmetric Encryption Schemes.- Two Attacks on a White-Box AES Implementation.- Extended Generalized Feistel Networks using Matrix Representation.- Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.- Implementing Lightweight Block Ciphers on x86 Architectures.- A new index calculus algorithm with complexity L(1=4 + o(1)) in small characteristic.- High Precision Discrete Gaussian Sampling on FPGAs.- Discrete Ziggurat: A Time-Memory Trade-o for Sampling from a Gaussian Distribution over the Integers.- Elliptic Curves, Pairings and RSA A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over GF(p).- Exponentiating in Pairing Groups.- Faster Repeated Doublings on Binary Elliptic Curves.- Montgomery Multiplication Using Vector Instructions.- Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.- Provable Second Preimage Resistance Revisited.- Multiple Limited-Birthday Distinguishers and Applications.- Horizontal Collision Correlation Attack on Elliptic Curves.- When Reverse-Engineering Meets Side-Channel Analysis - Digital Lock picking in Practice.
| Erscheint lt. Verlag | 11.6.2014 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XV, 590 p. 107 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 920 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Algorithmen | |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Algorithm analysis and problem complexity • applied cryptology • authentication • block and stream ciphers • cryptography • discrete logarithms • Elliptic Curve Cryptography • Hash Functions • hyperelliptic curve cryptography • lattices • MAC algorithms • mathematical foundations of cryptography • Pairing • public key algorithms • public key encryption • rsa • Security and Privacy • security services • side-channel attacks • symmetric cryptography |
| ISBN-13 | 9783662434130 / 9783662434130 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich