Description |
1 online resource (xix, 528 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 9566 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 9566. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology
|
Contents |
Intro; Preface; SAC 2015 The 22th Selected Areas in Cryptography Conference; Stafford Tavares Lecture; Trust Aware Traffic Security; Invited Lecture; Generic Attacks Against MAC Algorithms; Contents; Privacy Enhancing Technologies; Formal Treatment of Privacy-Enhancing Credential Systems; 1 Introduction; 2 Notation; 3 Privacy ABC Systems; 3.1 Syntax; 3.2 Oracles for Our Security Definitions; 3.3 Security Definitions for PABCs; 4 Building Blocks; 4.1 Global Setup; 4.2 Commitment Schemes; 4.3 Privacy-Enhancing Signatures; 4.4 Revocation Schemes; 4.5 Pseudonyms; 5 Generic Construction of PABCs |
|
5.1 Formal Description of the Construction6 Conclusion; References; Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption; 1 Introduction; 2 Background; 2.1 Graph Theory; 2.2 Noise Growth Model; 2.3 Complexity Theory; 2.4 Mixed Integer Linear Programming; 3 Complexity Analysis of the lmax-Minimizing Bootstrapping Problem; 3.1 A Polynomial Time Algorithm for lmax=2; 3.2 NP-Completeness of the lmax-Minimizing Bootstrapping Problem; 4 Minimizing Bootstrappings with Mixed Integer Linear Programming; 4.1 Defining Variables and Objective Function of the Program |
|
4.2 Linear Constraints4.3 Practical Experimentations; 5 Conclusion; References; Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks; 1 Introduction; 2 Preliminaries; 2.1 Homomorphic Encryption Scheme; 2.2 Biometric Authentication and Fingerprint Minutiae; 3 Secure Biometric Authentication Schemes; 3.1 Algorithms and Procedures; 3.2 Security; 4 Proposed Scheme; 4.1 Construction; 4.2 Security; 5 Conclusion; A Security of Proposed Scheme; A.1 Proof of Theorem 1 (Template Protection Against Server); A.2 Proof of Theorem 2 (Template Protection Against Decryptor) |
|
A.3 Proof of Theorem 3 (Security for Authentication)A.4 Proof of Theorem 4 (Security Against Hill-Climbing Attacks); References; Cryptanalysis of Symmetric-Key Primitives; Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks; 1 Introduction; 2 High Level Description of Sprout; 3 A Key Recovery Attack; 4 A Time-Memory-Data Tradeoff Attack; 4.1 Detailed Workload for d=40; 4.2 Reducing the Data Complexity; 5 Conclusion and Discussion; References; Related-Key Attack on Full-Round PICARO; 1 Introduction; 2 Description of PICARO; 2.1 Round Function; 2.2 Key-Schedule |
|
3 Definitions and Notation4 Key-Schedule Analysis; 4.1 Keys Leading to Colliding Ciphertexts; 5 Related-Key Attack on the Full-Round PICARO; 5.1 A First 2R-Attack; 5.2 Optimizations; 6 Conclusion; A PICARO Sbox; References; Cryptanalysis of Feistel Networks with Secret Round Functions; 1 Introduction; 2 Previous Attacks Against 5- and 6-Round Feistel Networks; 2.1 Differential Distinguishers; 2.2 Impossible Differential; 3 Yoyo Game and Cryptanalysis; 3.1 The Original Yoyo Game; 3.2 Theoretical Framework for the Yoyo Game; 3.3 The Yoyo Cryptanalysis Against 5-Round -Feistel Networks |
Summary |
This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed April 7, 2016) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Algorithms & data structures.
|
|
Coding theory & cryptology.
|
|
Discrete mathematics.
|
|
Computers -- Security -- General.
|
|
Computers -- Programming -- Algorithms.
|
|
Computers -- Information Theory.
|
|
Computers -- Data Processing.
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Dunkelman, Orr, editor
|
|
Keliher, Liam, editor
|
ISBN |
9783319313016 |
|
3319313010 |
|