Selected Areas in Cryptography
29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers
(Sprache: Englisch)
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
The 21 full papers presented in this volume...
The 21 full papers presented in this volume...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
Fr. 87.50
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „Selected Areas in Cryptography “
Klappentext zu „Selected Areas in Cryptography “
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.The 21 full papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are categorized into the following topical sections: lattices and ECC; differential cryptanalysis; cryptographic primitives; isogeny-based cryptography I; block ciphers; differential cryptanalysis II; isogeny-based cryptography II; and protocols and PRFs.
Inhaltsverzeichnis zu „Selected Areas in Cryptography “
1 Lattices and ECC.- Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All.- On the Weakness of Ring-LWE mod Prime Ideal q by Trace Map.- 2D-GLS: Faster and Exception-free Scalar Multiplication in the GLS254 Binary Curve.- 2 Differential Cryptanalysis.- Key-Recovery Attacks on CRAFT and WARP.- Differential Analysis of the Ternary Hash Function Troika.- Another Look at Differential-Linear Attacks.- 3 Cryptographic Primitives.- Rank Metric Trapdoor Functions with Homogeneous Errors.- PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords.- Improved Circuit-based PSI via Equality Preserving.- 4 Isogeny-Based Cryptography I.- Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge.- Patient Zero: Zero-Value Attacks on CSIDH and Variants.- An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves.- 5 Block Ciphers.- Finding All Impossible Differentials When Considering the DDT.- A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair.- Collision-Based Attacks on White-Box AES Implementations.- 6 Differential Cryptanalysis II.- Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN.- Improving the Automated Evaluation Algorithm against Differential Attacks and Application to WARP.- 7 Isogeny-based Cryptography II.- Faster Cryptographic Hash Function from Supersingular Isogeny Graphs.- 8 Protocols and PRFs.- From Plaintext-extractability to IND-CCA Security.- Farasha: A Provable Permutation-based Parallelizable PRF.- A Sponge-Based PRF with Good Multi-user Security.
Bibliographische Angaben
- 2024, 2024, XIX, 480 Seiten, 37 farbige Abbildungen, Masse: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Benjamin Smith, Huapeng Wu
- Verlag: Springer, Berlin
- ISBN-10: 3031584104
- ISBN-13: 9783031584107
Sprache:
Englisch
Kommentar zu "Selected Areas in Cryptography"
0 Gebrauchte Artikel zu „Selected Areas in Cryptography“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Selected Areas in Cryptography".
Kommentar verfassen