Description |
1 online resource (xiii, 430 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7118 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7118.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL -- Improved Analysis of ECHO-256 -- Provable Chosen-Target-Forced-Midfix Preimage Resistance -- On CCA-Secure Somewhat Homomorphic Encryption -- Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources -- Group Law Computations on Jacobians of Hyperelliptic Curves -- Cryptographic Analysis of All 4 x 4-Bit S-Boxes -- The Cryptographic Power of Random Selection -- Proof of Empirical RC4 Biases and New Key Correlations -- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher -- Practical Attack on the Full MMB Block Cipher -- Conditional Differential Cryptanalysis of Trivium and KATAN -- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 -- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 -- New Insights on Impossible Differential Cryptanalysis -- A Unified Framework for Small Secret Exponent Attack on RSA -- Very Compact Hardware Implementations of the Blockcipher CLEFIA -- Another Look at Tightness -- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications -- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles -- ASC-1: An Authenticated Encryption Stream Cipher -- On Various Families of Twisted Jacobi Quartics -- Improved Three-Way Split Formulas for Binary Polynomial Multiplication -- Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves -- Faster Hashing to \mathbb G2G2 |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography |
Analysis |
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Systems and Data Security |
|
Algorithm Analysis and Problem Complexity |
|
Information Systems Applications (incl. Internet) |
|
Computer Imaging, Vision, Pattern Recognition and Graphics |
Bibliography |
Includes bibliographical references and author index |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Data protection -- Congresses
|
|
Computer security -- Congresses
|
|
Informatique.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Miri, Ali.
|
|
Vaudenay, Serge.
|
ISBN |
9783642284960 |
|
3642284965 |
|
3642284957 |
|
9783642284953 |
|