Selected Areas in Cryptography -- SAC 2014 -

Selected Areas in Cryptography -- SAC 2014

21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

Antoine Joux, Amr Youssef (Herausgeber)

Buch | Softcover
X, 381 Seiten
2014 | 2014
Springer International Publishing (Verlag)
978-3-319-13050-7 (ISBN)
53,49 inkl. MwSt
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Malicious Hashing: Eve's Variant of SHA-1.- Binary Elligator Squared.- Batch NFS.- An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.- Colliding Keys for SC2000-256.- Faster Binary-Field Multiplication and Faster Binary-Field MACs.- OMD: A Compression Function Mode of Operation for Authenticated Encryption.- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.- Improved Differential Cryptanalysis of Round-Reduced Speck.- Differential Cryptanalysis of SipHash.- Weak Instances of PLWE.- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.- Side-Channel Analysis of Montgomery's Representation Randomization.- Practical Cryptanalysis of PAES.- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.- Error-Tolerant Side-Channel Cube Attack Revisited.- A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups.- Linear Biases in AEGIS Keystream.- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.- Fast Point Multiplication Algorithms for Binary Elliptic Curves with and Without Precomputation.- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.- Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster.

Erscheint lt. Verlag 10.12.2014
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 381 p. 66 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 599 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • Algorithms for cryptography • Applications • authenticated encryption • Block Ciphers • Computer Science • conference proceedings • Cryptanalysis • Cryptanalysis and their complexity analysis • Cryptographic permutations • cryptography • Efficient implementations of symmetric and public • Efficient implementations of symmetric and public key algorithms • hash function • Informatics • MAC algorithms • Mathematical and algorithmic aspects of applied cr • Mathematical and algorithmic aspects of applied cryptology • Research • Stream Ciphers • Symmetric key primitives
ISBN-10 3-319-13050-1 / 3319130501
ISBN-13 978-3-319-13050-7 / 9783319130507
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00