Advances in Cryptology – EUROCRYPT 2015
Springer Berlin (Verlag)
978-3-662-46799-2 (ISBN)
The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.
Cryptanalysis of the Multilinear Map over the Integers.- Robust Authenticated-Encryption AEZ and the Problem That It Solves.- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.- A Provable-Security Analysis of Intel's Secure Key RNG.- A Formal Treatment of Backdoored Pseudorandom Generators.- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields.- The Multiple Number Field Sieve with Conjugation and Generalized.- Better Algorithms for LWE and LWR.- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes.- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.- Structural Evaluation by Generalized Integral Property.- Cryptanalysis of SP Networks with Partial Non-Linear Layers.- The Sum Can Be Weaker Than Each Part.- SPHINCS: Practical Stateless Hash-Based Signatures.- Making Masking Security Proofs Concrete: Or How to Evaluate the Security of Any Leaking Device.- Ciphers for MPC and FHE.- Verified Proofs of Higher-Order Masking.- Inner Product Masking Revisited.- Fully Homomophic Encryption over the Integers Revisited.- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces .- KDM-CCA Security from RKA Secure Authenticated Encryption.- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.- Bootstrapping for HElib.- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.- How to Efficiently Evaluate RAM Programs with Malicious Security.- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.- Twisted Polynomials and Forgery Attacks on GCM.- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Samplingin Structured Lattices.
Erscheint lt. Verlag | 1.4.2015 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XVII, 818 p. 123 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1258 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Applications • authenticated encryption • Cluster Computing • Computer Science • conference proceedings • Cryptanalysis • deterministic encryption • differential cryptanalysis • Hash Functions • ideal cipher • Informatics • interactive theorem proving • Lightweight cryptography • Linear Cryptanalysis • MapReduce • meet-in-the-middle • post-quantum cryptography • provable security • public key encryption • Research • Secure Multiparty Computation • security protocols • vectorized implementation • Zero Knowledge |
ISBN-10 | 3-662-46799-2 / 3662467992 |
ISBN-13 | 978-3-662-46799-2 / 9783662467992 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich