Selected Areas in Cryptography – SAC 2019 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers /
Selected Areas in Cryptography – SAC 2019 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / [electronic resource] :
edited by Kenneth G. Paterson, Douglas Stebila.
- 1st ed. 2020.
- XV, 715 p. 323 illus., 66 illus. in color. online resource.
- Security and Cryptology, 11959 2946-1863 ; .
- Security and Cryptology, 11959 .
Block Cipher Modes of Operation and Provable Security -- Looking Back/My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
9783030384715
10.1007/978-3-030-38471-5 doi
Data protection.
Computer engineering.
Computer networks .
Data structures (Computer science).
Information theory.
Artificial intelligence.
Data and Information Security.
Computer Engineering and Networks.
Data Structures and Information Theory.
Artificial Intelligence.
QA76.9.A25
005.8
Block Cipher Modes of Operation and Provable Security -- Looking Back/My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
9783030384715
10.1007/978-3-030-38471-5 doi
Data protection.
Computer engineering.
Computer networks .
Data structures (Computer science).
Information theory.
Artificial intelligence.
Data and Information Security.
Computer Engineering and Networks.
Data Structures and Information Theory.
Artificial Intelligence.
QA76.9.A25
005.8