Buch, Englisch, 452 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers
Buch, Englisch, 452 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-53367-9
Verlag: Springer Nature Switzerland
The 21full papers presented in these proceedings were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: Cryptanalysis of Lightweight Ciphers; Side-Channel Attacks and Countermeasures; Post-Quantum Constructions; Symmetric cryptography and fault attacks; Post-Quantum Analysis and Implementations; Homomorphic encryption; Public-Key Cryptography; and Differential Cryptanalysis.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Cryptanalysis of Lightweight Ciphers.- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.- Improving the Rectangle Attack on GIFT-64.- Side-Channel Attacks and Countermeasures.- Mask Compression: High-Order Masking on Memory-Constrained Devices.- Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme.- Threshold Implementations with Non-Uniform Inputs.- Post-Quantum Constructions.- SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits.- A Post-Quantum Round-Optimal Oblivious PRF from Isogenies.- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.- Symmetric cryptography and fault attacks.- The Random Fault Model.- Probabilistic Related-Key Statistical Saturation Cryptanalysis.- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.- Post-Quantum Analysis and Implementations.- Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks.- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery.- Fast and Efficient Hardware Implementation of HQC.- Homomorphic encryption.- On the Precision Loss in Approximate Homomorphic Encryption.- Secure Function Extensions to Additively Homomorphic Cryptosystems.- Public-Key Cryptography.- Generalized Implicit Factorization Problem.- Differential Cryptanalysis.- CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives.- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.