Selected Areas in Cryptography – SAC 2023
Springer International Publishing (Verlag)
978-3-031-53367-9 (ISBN)
The 21full papers presented in these proceedings were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: Cryptanalysis of Lightweight Ciphers; Side-Channel Attacks and Countermeasures; Post-Quantum Constructions; Symmetric cryptography and fault attacks; Post-Quantum Analysis and Implementations; Homomorphic encryption; Public-Key Cryptography; and Differential Cryptanalysis.
Cryptanalysis of Lightweight Ciphers.- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.- Improving the Rectangle Attack on GIFT-64.- Side-Channel Attacks and Countermeasures.- Mask Compression: High-Order Masking on Memory-Constrained Devices.- Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme.- Threshold Implementations with Non-Uniform Inputs.- Post-Quantum Constructions.- SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits.- A Post-Quantum Round-Optimal Oblivious PRF from Isogenies.- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.- Symmetric cryptography and fault attacks.- The Random Fault Model.- Probabilistic Related-Key Statistical Saturation Cryptanalysis.- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.- Post-Quantum Analysis and Implementations.- Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks.- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery.- Fast and Efficient Hardware Implementation of HQC.- Homomorphic encryption.- On the Precision Loss in Approximate Homomorphic Encryption.- Secure Function Extensions to Additively Homomorphic Cryptosystems.- Public-Key Cryptography.- Generalized Implicit Factorization Problem.- Differential Cryptanalysis.- CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives.- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.
Erscheinungsdatum | 20.02.2024 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIX, 452 p. 87 illus., 37 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 718 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Adaptive Control Systems • authentication • Automation • Computer Networks • Computer Security • Computer systems • Cryptology • Data Security • Fuzzy Sets • Linear Matrix Inequalities • Matrix Algebra • Network Protocols • Network Security • Public Key Cryptography • Signal Processing |
ISBN-10 | 3-031-53367-4 / 3031533674 |
ISBN-13 | 978-3-031-53367-9 / 9783031533679 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich