Selected Areas in Cryptography - SAC 2024
Selected Areas in Cryptography - SAC 2024
31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part II
Gambs, Sebastien; Eichlseder, Maria
Springer International Publishing AG
04/2025
311
Mole
9783031828409
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
.- Authenticated Encryption.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation: Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation: Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cryptography;privacy;public-key cryptography;applied cryptology;symmetric-key primitives;block ciphers;stream ciphers;hash functions;MAC algorithms;cryptographic permutations;authenticated encryption;efficient implementations;mathematical aspects;privacy-enhancing technologies;post-quantum cryptography
.- Authenticated Encryption.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation: Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation: Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cryptography;privacy;public-key cryptography;applied cryptology;symmetric-key primitives;block ciphers;stream ciphers;hash functions;MAC algorithms;cryptographic permutations;authenticated encryption;efficient implementations;mathematical aspects;privacy-enhancing technologies;post-quantum cryptography