Selected Areas in Cryptography

CHF 107.95
Auf Lager
SKU
LU2IKGHVRO5
Stock 1 Verfügbar
Geliefert zwischen Fr., 21.11.2025 und Mo., 24.11.2025

Details

Klappentext

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.


Inhalt
Block Cipher Cryptanalysis.- Improved DST Cryptanalysis of IDEA.- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.- Related-Key Rectangle Attack on the Full SHACAL-1.- Stream Cipher Cryptanalysis I.- Cryptanalysis of Achterbahn-Version 2.- Cryptanalysis of the Stream Cipher ABC v2.- The Design of a Stream Cipher LEX.- Dial C for Cipher.- Improved Security Analysis of XEX and LRW Modes.- Extended Hidden Number Problem and Its Cryptanalytic Applications.- Changing the Odds Against Masked Logic.- Advances on Access-Driven Cache Attacks on AES.- Blind Differential Cryptanalysis for Enhanced Power Attacks.- Efficient Implementations I.- Efficient Implementations of Multivariate Quadratic Systems.- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.- Stream Cipher Cryptanalysis II.- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.- Multi-pass Fast Correlation Attack on Stream Ciphers.- Crossword Puzzle Attack on NLS.- Invited Talk.- When Stream Cipher Analysis Meets Public-Key Cryptography.- Efficient Implementations II.- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets.- Pairing Calculation on Supersingular Genus 2 Curves.- Efficient Divisor Class Halving on Genus Two Curves.- Message Authentication on 64-Bit Architectures.- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.- Constructing an Ideal Hash Function from Weak Ideal Compression Functions.- Provably Good Codes for Hash Function Design.

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09783540744610
    • Editor Eli Biham, Amr M. Youssef
    • Sprache Englisch
    • Größe H235mm x B155mm
    • Jahr 2007
    • EAN 9783540744610
    • Format Kartonierter Einband
    • ISBN 978-3-540-74461-0
    • Veröffentlichung 21.09.2007
    • Titel Selected Areas in Cryptography
    • Untertitel 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers
    • Gewicht 1270g
    • Herausgeber Springer-Verlag GmbH
    • Anzahl Seiten 395
    • Lesemotiv Verstehen
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470