Selected Areas in Cryptography -- SAC 2014
Springer International Publishing (Verlag)
978-3-319-13050-7 (ISBN)
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Malicious Hashing: Eve's Variant of SHA-1.- Binary Elligator Squared.- Batch NFS.- An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.- Colliding Keys for SC2000-256.- Faster Binary-Field Multiplication and Faster Binary-Field MACs.- OMD: A Compression Function Mode of Operation for Authenticated Encryption.- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.- Improved Differential Cryptanalysis of Round-Reduced Speck.- Differential Cryptanalysis of SipHash.- Weak Instances of PLWE.- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.- Side-Channel Analysis of Montgomery's Representation Randomization.- Practical Cryptanalysis of PAES.- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.- Error-Tolerant Side-Channel Cube Attack Revisited.- A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups.- Linear Biases in AEGIS Keystream.- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.- Fast Point Multiplication Algorithms for Binary Elliptic Curves with and Without Precomputation.- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.- Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster.
Erscheint lt. Verlag | 10.12.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 381 p. 66 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 599 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Algorithm analysis and problem complexity • Algorithms for cryptography • Applications • authenticated encryption • Block Ciphers • Computer Science • conference proceedings • Cryptanalysis • Cryptanalysis and their complexity analysis • Cryptographic permutations • cryptography • Efficient implementations of symmetric and public • Efficient implementations of symmetric and public key algorithms • hash function • Informatics • MAC algorithms • Mathematical and algorithmic aspects of applied cr • Mathematical and algorithmic aspects of applied cryptology • Research • Stream Ciphers • Symmetric key primitives |
ISBN-10 | 3-319-13050-1 / 3319130501 |
ISBN-13 | 978-3-319-13050-7 / 9783319130507 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich