Selected Areas in Cryptography – SAC 2019
Springer International Publishing (Verlag)
978-3-030-38470-8 (ISBN)
Block Cipher Modes of Operation and Provable Security.- Looking Back|My Life as a Mathematician and Cryptographer.- Supersingular Isogeny Key Exchange for Beginners.- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES.- Iterative Differential Characteristic of TRIFLE-BC.- Plaintext Recovery Attacks against XTS Beyond Collisions.- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.- Algebraic Cryptanalysis of Variants of Frit.- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree.- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules.- Towards a Practical Cluster Analysis over Encrypted Data.- Breaking the Bluetooth Pairing { The Fixed Coordinate Invalid Curve Attack.- Using TopGear in Overdrive: A more e cient ZKPoK for SPDZ.- On the Real-World Instantiability of Admissible Hash Functions and Effcient Verifiable Random Functions.- Tight Security Bounds for Generic Stream Cipher Constructions.- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.- A Lightweight Alternative to PMAC.- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks.- Ternary Syndrome Decoding with Large Weight.- Exploring Trade-o s in Batch Bounded Distance Decoding.- On Quantum Slide Attacks.- XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V 1.- A timing attack on the HQC encryption scheme.- Block-Anti-Circulant Unbalanced Oil and Vinegar.- A DFA Attack on White-Box Implementations of AES with External Encodings.- Parallelizable Authenticated Encryption with Small State Size.- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery.- BBQ: Using AES in Picnic Signatures.- Towards practical GGM-based PRF from (Module-)Learning-with Rounding.
| Erscheinungsdatum | 22.01.2020 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XV, 715 p. 323 illus., 66 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 1104 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Adaptive Control Systems • Artificial Intelligence • authentication • Block Ciphers • case based reasoning • Computer Science • Cryptanalysis • Cryptoanalysis • cryptography • Data Mining • digital signature • electronic document identification systems • Embedded Systems • Encryption • Knowledge-Based System • mathematical foundations of cryptography • Network Security • privacy preserving • Public Key Cryptography • public key techniques • Software engineering • Stream Ciphers • symmetric cryptography and hash functions • wireless telecommunication systems |
| ISBN-10 | 3-030-38470-5 / 3030384705 |
| ISBN-13 | 978-3-030-38470-8 / 9783030384708 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich