Limit search to available items
Book Cover
E-book
Author SAC (Conference) (22nd : 2015 : Sackville, N.B.)

Title Selected areas in cryptography -- SAC 2015 : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised selected papers / Orr Dunkelman, Liam Keliher (eds.)
Published Switzerland : Springer, 2016

Copies

Description 1 online resource (xix, 528 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 9566
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9566. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology
Contents Intro; Preface; SAC 2015 The 22th Selected Areas in Cryptography Conference; Stafford Tavares Lecture; Trust Aware Traffic Security; Invited Lecture; Generic Attacks Against MAC Algorithms; Contents; Privacy Enhancing Technologies; Formal Treatment of Privacy-Enhancing Credential Systems; 1 Introduction; 2 Notation; 3 Privacy ABC Systems; 3.1 Syntax; 3.2 Oracles for Our Security Definitions; 3.3 Security Definitions for PABCs; 4 Building Blocks; 4.1 Global Setup; 4.2 Commitment Schemes; 4.3 Privacy-Enhancing Signatures; 4.4 Revocation Schemes; 4.5 Pseudonyms; 5 Generic Construction of PABCs
5.1 Formal Description of the Construction6 Conclusion; References; Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption; 1 Introduction; 2 Background; 2.1 Graph Theory; 2.2 Noise Growth Model; 2.3 Complexity Theory; 2.4 Mixed Integer Linear Programming; 3 Complexity Analysis of the lmax-Minimizing Bootstrapping Problem; 3.1 A Polynomial Time Algorithm for lmax=2; 3.2 NP-Completeness of the lmax-Minimizing Bootstrapping Problem; 4 Minimizing Bootstrappings with Mixed Integer Linear Programming; 4.1 Defining Variables and Objective Function of the Program
4.2 Linear Constraints4.3 Practical Experimentations; 5 Conclusion; References; Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks; 1 Introduction; 2 Preliminaries; 2.1 Homomorphic Encryption Scheme; 2.2 Biometric Authentication and Fingerprint Minutiae; 3 Secure Biometric Authentication Schemes; 3.1 Algorithms and Procedures; 3.2 Security; 4 Proposed Scheme; 4.1 Construction; 4.2 Security; 5 Conclusion; A Security of Proposed Scheme; A.1 Proof of Theorem 1 (Template Protection Against Server); A.2 Proof of Theorem 2 (Template Protection Against Decryptor)
A.3 Proof of Theorem 3 (Security for Authentication)A.4 Proof of Theorem 4 (Security Against Hill-Climbing Attacks); References; Cryptanalysis of Symmetric-Key Primitives; Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks; 1 Introduction; 2 High Level Description of Sprout; 3 A Key Recovery Attack; 4 A Time-Memory-Data Tradeoff Attack; 4.1 Detailed Workload for d=40; 4.2 Reducing the Data Complexity; 5 Conclusion and Discussion; References; Related-Key Attack on Full-Round PICARO; 1 Introduction; 2 Description of PICARO; 2.1 Round Function; 2.2 Key-Schedule
3 Definitions and Notation4 Key-Schedule Analysis; 4.1 Keys Leading to Colliding Ciphertexts; 5 Related-Key Attack on the Full-Round PICARO; 5.1 A First 2R-Attack; 5.2 Optimizations; 6 Conclusion; A PICARO Sbox; References; Cryptanalysis of Feistel Networks with Secret Round Functions; 1 Introduction; 2 Previous Attacks Against 5- and 6-Round Feistel Networks; 2.1 Differential Distinguishers; 2.2 Impossible Differential; 3 Yoyo Game and Cryptanalysis; 3.1 The Original Yoyo Game; 3.2 Theoretical Framework for the Yoyo Game; 3.3 The Yoyo Cryptanalysis Against 5-Round -Feistel Networks
Summary This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed April 7, 2016)
Subject Data encryption (Computer science) -- Congresses
Computer security.
Algorithms & data structures.
Coding theory & cryptology.
Discrete mathematics.
Computers -- Security -- General.
Computers -- Programming -- Algorithms.
Computers -- Information Theory.
Computers -- Data Processing.
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dunkelman, Orr, editor
Keliher, Liam, editor
ISBN 9783319313016
3319313010
Other Titles SAC 2015