Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Selected Areas in Cryptography – SAC 2024 -

Selected Areas in Cryptography – SAC 2024

31st International Conference, Montreal, QC, Canada, August 28–30, 2024, Revised Selected Papers, Part II
Buch | Softcover
XII, 318 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-82840-9 (ISBN)
CHF 98,85 inkl. MwSt
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.

The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions.

This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.

The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections:

Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption.

Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.

.- Authenticated Encryption.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation: Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XII, 318 p. 51 illus., 26 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte applied cryptology • authenticated encryption • Block Ciphers • Cryptographic permutations • cryptography • efficient implementations • Hash Functions • MAC algorithms • mathematical aspects • post-quantum cryptography • privacy • Privacy-Enhancing Technologies • Public-Key Cryptography • Stream Ciphers • symmetric-key primitives
ISBN-10 3-031-82840-2 / 3031828402
ISBN-13 978-3-031-82840-9 / 9783031828409
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95