• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Selected areas in cryptography -- SAC 2018 :

پدید آورنده
Carlos Cid, Michael J. Jacobson Jr. (eds.).

موضوع
Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030109704
(Number (ISBN
9783030109707
Erroneous ISBN
9783030109691

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Selected areas in cryptography -- SAC 2018 :
General Material Designation
[Book]
Other Title Information
25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised selected papers /
First Statement of Responsibility
Carlos Cid, Michael J. Jacobson Jr. (eds.).

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xi, 499 pages) :
Other Physical Details
illustrations (some color)

SERIES

Series Title
Lecture notes in computer science ;
Series Title
LNCS sublibrary. SL 4, Security and cryptology
Volume Designation
11349

GENERAL NOTES

Text of Note
Includes author index.

CONTENTS NOTE

Text of Note
Intro; Preface; Organization; Contents; Design of Symmetric Key Primitives; Targeted Ciphers for Format-Preserving Encryption; 1 Introduction; 2 Preliminaries; 3 Targeted Swap-or-Not; 4 Mix-Swap-Unmix; A Analyzing a Matching Exchange Process; B Game for Proof of Theorem2; References; Variants of the AES Key Schedule for Better Truncated Differential Bounds; 1 Introduction; 2 Background; 3 Generic Bounds; 4 Searching for a Permutation; 4.1 Bound on 5 Rounds; 4.2 Finding a Permutation over 6 Rounds; 5 Tweaking both ShiftRows and the Key Schedule; 6 Conclusion
Text of Note
6.1 Attack Procedure for sLiSCP-1926.2 Attack Procedure for sLiSCP-256; 7 Concluding Remarks; A Appendix; References; Finding Integral Distinguishers with Ease; 1 Introduction; 2 Division Property and Division Trails; 2.1 Background; 2.2 Formalism of Bit-Based Division Properties; 2.3 Rules of Choice Vector Propagation; 3 Solvatore -- Automated Finding of Integral Properties; 3.1 Modeling Division Property Propagation with SAT; 3.2 Finding Integral Distinguishers; 4 Distinguishers and Bounds; 4.1 Methodology; 4.2 SPN; 4.3 ARX; 4.4 Feistel; 4.5 Reflection; 4.6 Bit-Sliced; 4.7 LFSR-Based
Text of Note
A Modelizing the MC Equations in Constraint ProgrammingB Number of Cycles to Build a Permutation Reaching 18 S-Boxes over 5 Rounds; C Generic Simulated Annealing Algorithm; D Proof of Proposition6; E Pairs (Ps, Pk) Reaching 21 Sboxes over 6 Rounds; References; Analysis and Improvement of an Authentication Scheme in Incremental Cryptography; 1 Introduction; 1.1 Contributions of the Paper; 2 Preliminaries; 2.1 Notations; 2.2 Definitions; 2.3 Description of the XOR-Scheme; 3 Forgery Attacks Against the XOR-Scheme; 4 Modification of the XOR-Scheme; 5 Security Proof; 6 Conclusion; A Appendix
Text of Note
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes1 Introduction; 2 Specification of sLiSCP; 2.1 sLiSCP Permutation; 2.2 sLiSCP Mode for Hash Function and Authenticated Encryption; 3 Differential Trail Search on sLiSCP; 4 6-Steps Forgery in AE Mode; 4.1 Forgery; 4.2 Extension to State Recovery and Plaintext Recovery; 5 6-Steps Collision Attacks in Hashing Mode; 5.1 Overall: Four-Block Collision Strategy; 5.2 Attack Procedure for sLiSCP-256; 5.3 Attack Procedure for sLiSCP-192; 6 15-Steps Rebound Attacks Against sLiSCP Permutation
0
8
8
8

SUMMARY OR ABSTRACT

Text of Note
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030109707

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9783030109691
International Standard Book Number
9783030109714

PARALLEL TITLE PROPER

Parallel Title
SAC 2018

TOPICAL NAME USED AS SUBJECT

Computer security, Congresses.
Data encryption (Computer science), Congresses.
Computer security.
Data encryption (Computer science)

(SUBJECT CATEGORY (Provisional

COM053000
UR
UR
UTN

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8/24
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Cid, Carlos
Jacobson, Michael, (Computer scientist)

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

SAC (Conference)(25th :2018 :, Calgary, Alta.)

ORIGINATING SOURCE

Date of Transaction
20200823082638.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival