The Resource Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
Resource Information
The item Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of MissouriSt. Louis Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of MissouriSt. Louis Libraries.
This item is available to borrow from 1 library branch.
 Summary
 This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis
 Language
 eng
 Extent
 1 online resource.
 Contents

 Intro; Preface; Organization; Contents; Malicious Hashing: Eve's Variant of SHA1; 1 Introduction; 2 Malicious Hashing; 2.1 Malicious Cryptography and Backdoors; 2.2 Definitions; 3 Eve's Variant of SHA1; 3.1 Short Description of SHA1; 3.2 Differential Attack Strategy for SHA1; 3.3 Malicious Collision Attack; 4 Building Meaningful Collisions; 4.1 Constraints; 4.2 Binary File Format Overview; 4.3 Example Files; A Full Characteristic for Malicious SHA1; References; Binary Elligator Squared; 1 Introduction; 2 Preliminaries; 2.1 WellBounded Encodings; 2.2 Elligator Squared
 2.3 Shallue  van de Woestijne in Characteristic 22.4 Lambda Affine Coordinates; 3 Algorithmic Aspects; 3.1 The Subroutine SWCHAR2; 3.2 The Subroutine PREIMAGESSW; 3.3 Operation Counts; 4 Implementation Aspects; 5 Experimental Results; 6 Comparison of Elligator 2 and Elligator Squared on Prime Finite Fields; References; Batch NFS; 1 Introduction; 1.1 Contents of this paper.; 1.2 Security consequences.; 1.3 Previous work.; 2 Exponents; 2.1 QS: the Quadratic sieve (1982).; 2.2 NFS: the numberfield sieve (1993).; 2.3 RAM cost analysis (1993).; 2.4 AT cost analysis (2001)
 2.5 The factorization factory (1993).2.6 Batch NFS (new).; 2.11 Comparison and numerical parameter optimization.; 3 Earlyabort ECM; 3.1 Earlyabort trial division.; 3.2 Early aborts in more generality.; 3.3 Performance of early aborts.; 3.4 Understanding the heuristics.; 3.5 Impact of early aborts on smoothness probabilities.; A ECM; References; An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL8X; 1 Introduction; 2 The Cipher FEAL8X; 2.1 An Equivalent Description of FEAL8X; 3 First Attack  Finding the Key Using 215 Known Plaintexts
 3.1 The Linear Approximations3.2 The Basic Attack; 3.3 Matching Subkeys from the Backward and Forward Directions; 3.4 Retrieving the Rest of the Subkeys; 4 The Partitioning Technique  Finding the Key Using 214 Known Plaintexts; 4.1 A Simplified Example; 4.2 The Attack; 5 Attacking FEAL8X Using 210 Known Plaintexts with Complexity 262; 6 Attacks with a Few Known or Chosen Plaintexts; 6.1 Differential and Linear Exhaustive Search Attacks; 6.2 Meet in the Middle Attacks; 7 Summary; A Efficient Implementation; B The Linear Approximations Used in Our Attacks; References
 Colliding Keys for SC20002561 Introduction; 2 Description of SC2000256; 3 Key Collisions for SC2000256; 3.1 Specifying the Difference for the Second Phase; 3.2 Finding Pairs in the First Phase; 4 Results and Applications; 5 Conclusion; References; Faster BinaryField Multiplication and Faster BinaryField MACs; 1 Introduction; 1.1 IntegerMultiplication Hardware; 1.2 New Speeds for BinaryField MACs; 1.3 New BitOperation Records for BinaryField Multiplication; 1.4 PolynomialMultiplication Hardware: PCLMULQDQ; 2 Field Arithmetic in F28; 2.1 Review of Tower Fields
 Isbn
 9783319130514
 Label
 Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers
 Title
 Selected areas in cryptography  SAC 2014
 Title remainder
 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers
 Statement of responsibility
 Antoine Joux, Amr Youssef (Eds.)
 Title variation
 SAC 2014
 Language
 eng
 Summary
 This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis
 Cataloging source
 NLGGC
 Dewey number
 005.8/2
 Index
 no index present
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://bibfra.me/vocab/lite/meetingDate
 2014
 http://bibfra.me/vocab/lite/meetingName
 SAC (Conference)
 Nature of contents
 dictionaries
 http://library.link/vocab/relatedWorkOrContributorName

 Joux, Antoine
 Youssef, Amr M.
 Series statement

 Lecture Notes in Computer Science,
 LNCS sublibrary. SL 4, Security and cryptology
 Series volume
 8781
 http://library.link/vocab/subjectName

 Data encryption (Computer science)
 Computer science
 Data protection
 Coding theory
 Computer software
 Coding theory
 Computer science
 Computer software
 Data encryption (Computer science)
 Data protection
 Label
 Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents

 Intro; Preface; Organization; Contents; Malicious Hashing: Eve's Variant of SHA1; 1 Introduction; 2 Malicious Hashing; 2.1 Malicious Cryptography and Backdoors; 2.2 Definitions; 3 Eve's Variant of SHA1; 3.1 Short Description of SHA1; 3.2 Differential Attack Strategy for SHA1; 3.3 Malicious Collision Attack; 4 Building Meaningful Collisions; 4.1 Constraints; 4.2 Binary File Format Overview; 4.3 Example Files; A Full Characteristic for Malicious SHA1; References; Binary Elligator Squared; 1 Introduction; 2 Preliminaries; 2.1 WellBounded Encodings; 2.2 Elligator Squared
 2.3 Shallue  van de Woestijne in Characteristic 22.4 Lambda Affine Coordinates; 3 Algorithmic Aspects; 3.1 The Subroutine SWCHAR2; 3.2 The Subroutine PREIMAGESSW; 3.3 Operation Counts; 4 Implementation Aspects; 5 Experimental Results; 6 Comparison of Elligator 2 and Elligator Squared on Prime Finite Fields; References; Batch NFS; 1 Introduction; 1.1 Contents of this paper.; 1.2 Security consequences.; 1.3 Previous work.; 2 Exponents; 2.1 QS: the Quadratic sieve (1982).; 2.2 NFS: the numberfield sieve (1993).; 2.3 RAM cost analysis (1993).; 2.4 AT cost analysis (2001)
 2.5 The factorization factory (1993).2.6 Batch NFS (new).; 2.11 Comparison and numerical parameter optimization.; 3 Earlyabort ECM; 3.1 Earlyabort trial division.; 3.2 Early aborts in more generality.; 3.3 Performance of early aborts.; 3.4 Understanding the heuristics.; 3.5 Impact of early aborts on smoothness probabilities.; A ECM; References; An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL8X; 1 Introduction; 2 The Cipher FEAL8X; 2.1 An Equivalent Description of FEAL8X; 3 First Attack  Finding the Key Using 215 Known Plaintexts
 3.1 The Linear Approximations3.2 The Basic Attack; 3.3 Matching Subkeys from the Backward and Forward Directions; 3.4 Retrieving the Rest of the Subkeys; 4 The Partitioning Technique  Finding the Key Using 214 Known Plaintexts; 4.1 A Simplified Example; 4.2 The Attack; 5 Attacking FEAL8X Using 210 Known Plaintexts with Complexity 262; 6 Attacks with a Few Known or Chosen Plaintexts; 6.1 Differential and Linear Exhaustive Search Attacks; 6.2 Meet in the Middle Attacks; 7 Summary; A Efficient Implementation; B The Linear Approximations Used in Our Attacks; References
 Colliding Keys for SC20002561 Introduction; 2 Description of SC2000256; 3 Key Collisions for SC2000256; 3.1 Specifying the Difference for the Second Phase; 3.2 Finding Pairs in the First Phase; 4 Results and Applications; 5 Conclusion; References; Faster BinaryField Multiplication and Faster BinaryField MACs; 1 Introduction; 1.1 IntegerMultiplication Hardware; 1.2 New Speeds for BinaryField MACs; 1.3 New BitOperation Records for BinaryField Multiplication; 1.4 PolynomialMultiplication Hardware: PCLMULQDQ; 2 Field Arithmetic in F28; 2.1 Review of Tower Fields
 Control code
 897803244
 Extent
 1 online resource.
 Form of item
 online
 Isbn
 9783319130514
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Other control number
 10.1007/9783319130514
 Specific material designation
 remote
 System control number
 (OCoLC)897803244
 Label
 Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents

 Intro; Preface; Organization; Contents; Malicious Hashing: Eve's Variant of SHA1; 1 Introduction; 2 Malicious Hashing; 2.1 Malicious Cryptography and Backdoors; 2.2 Definitions; 3 Eve's Variant of SHA1; 3.1 Short Description of SHA1; 3.2 Differential Attack Strategy for SHA1; 3.3 Malicious Collision Attack; 4 Building Meaningful Collisions; 4.1 Constraints; 4.2 Binary File Format Overview; 4.3 Example Files; A Full Characteristic for Malicious SHA1; References; Binary Elligator Squared; 1 Introduction; 2 Preliminaries; 2.1 WellBounded Encodings; 2.2 Elligator Squared
 2.3 Shallue  van de Woestijne in Characteristic 22.4 Lambda Affine Coordinates; 3 Algorithmic Aspects; 3.1 The Subroutine SWCHAR2; 3.2 The Subroutine PREIMAGESSW; 3.3 Operation Counts; 4 Implementation Aspects; 5 Experimental Results; 6 Comparison of Elligator 2 and Elligator Squared on Prime Finite Fields; References; Batch NFS; 1 Introduction; 1.1 Contents of this paper.; 1.2 Security consequences.; 1.3 Previous work.; 2 Exponents; 2.1 QS: the Quadratic sieve (1982).; 2.2 NFS: the numberfield sieve (1993).; 2.3 RAM cost analysis (1993).; 2.4 AT cost analysis (2001)
 2.5 The factorization factory (1993).2.6 Batch NFS (new).; 2.11 Comparison and numerical parameter optimization.; 3 Earlyabort ECM; 3.1 Earlyabort trial division.; 3.2 Early aborts in more generality.; 3.3 Performance of early aborts.; 3.4 Understanding the heuristics.; 3.5 Impact of early aborts on smoothness probabilities.; A ECM; References; An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL8X; 1 Introduction; 2 The Cipher FEAL8X; 2.1 An Equivalent Description of FEAL8X; 3 First Attack  Finding the Key Using 215 Known Plaintexts
 3.1 The Linear Approximations3.2 The Basic Attack; 3.3 Matching Subkeys from the Backward and Forward Directions; 3.4 Retrieving the Rest of the Subkeys; 4 The Partitioning Technique  Finding the Key Using 214 Known Plaintexts; 4.1 A Simplified Example; 4.2 The Attack; 5 Attacking FEAL8X Using 210 Known Plaintexts with Complexity 262; 6 Attacks with a Few Known or Chosen Plaintexts; 6.1 Differential and Linear Exhaustive Search Attacks; 6.2 Meet in the Middle Attacks; 7 Summary; A Efficient Implementation; B The Linear Approximations Used in Our Attacks; References
 Colliding Keys for SC20002561 Introduction; 2 Description of SC2000256; 3 Key Collisions for SC2000256; 3.1 Specifying the Difference for the Second Phase; 3.2 Finding Pairs in the First Phase; 4 Results and Applications; 5 Conclusion; References; Faster BinaryField Multiplication and Faster BinaryField MACs; 1 Introduction; 1.1 IntegerMultiplication Hardware; 1.2 New Speeds for BinaryField MACs; 1.3 New BitOperation Records for BinaryField Multiplication; 1.4 PolynomialMultiplication Hardware: PCLMULQDQ; 2 Field Arithmetic in F28; 2.1 Review of Tower Fields
 Control code
 897803244
 Extent
 1 online resource.
 Form of item
 online
 Isbn
 9783319130514
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Other control number
 10.1007/9783319130514
 Specific material designation
 remote
 System control number
 (OCoLC)897803244
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.umsl.edu/portal/SelectedareasincryptographySAC201421st/2W5j1VjqPrE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/SelectedareasincryptographySAC201421st/2W5j1VjqPrE/">Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of MissouriSt. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.umsl.edu/portal/SelectedareasincryptographySAC201421st/2W5j1VjqPrE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/SelectedareasincryptographySAC201421st/2W5j1VjqPrE/">Selected areas in cryptography  SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 1415, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of MissouriSt. Louis Libraries</a></span></span></span></span></div>