E-Book, Englisch, Band 12804, 722 Seiten, eBook
Dunkelman / Jacobson, Jr. / Jacobson Selected Areas in Cryptography
1. Auflage 2021
ISBN: 978-3-030-81652-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers
E-Book, Englisch, Band 12804, 722 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-81652-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Public-key Cryptography.- Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.- FROST: Flexible Round-Optimized Schnorr Threshold Signatures.- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM.- Obfuscating Finite Automata.- On Index Calculus Algorithms for Subfield Curves.- Symmetric-Key Analysis Weak-Key Distinguishers for AES .- Algebraic Key-Recovery Attacks on Reduced-Round Xoofff.- Improved (Related-key) Differential Cryptanalysis on GIFT.- Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath.- Boolean Ring Cryptographic Equation Solving.- Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.- Unintended Features of APIs: Cryptanalysis of Incremental HMAC.- Quantum Cryptanalysis.- Low-gate Quantum Golden Collision Finding.- Improvements to quantum search techniques for block-ciphers, with applications to AES.- Post-Quantum Constructions.- Not enough LESS: An improved algorithm for solving Code Equivalence Problems over F q .- Towards Post-Quantum Security for Signal’s X3DH Handshake.- Trapdoor DDH groups from pairings and isogenies.- Practical Isogeny-Based Key-exchange with Optimal Tightness.- Symmetric-Key Design.- PRINCEv2.- Nonce-Misuse Security of the SAEF Authenticated Encryption mode.- WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.- Side Channel Attacks .- Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations.- Correlation Power Analysis and Higher-order Masking Implementation of WAGE.- On the Influence of Optimizers in Deep Learning-based Side-channel Analysis.- Cryptographic Applications.- On Self-Equivalence Encodings in White-Box Implementations.- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting.- High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.-