Coverart for item
The Resource Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)

Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)

Label
Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers
Title
Selected areas in cryptography -- SAC 2014
Title remainder
21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers
Statement of responsibility
Antoine Joux, Amr Youssef (Eds.)
Title variation
SAC 2014
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis
Member of
Cataloging source
NLGGC
Dewey number
005.8/2
Index
no index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2014
http://bibfra.me/vocab/lite/meetingName
SAC (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Joux, Antoine
  • Youssef, Amr M.
Series statement
  • Lecture Notes in Computer Science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
8781
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer science
  • Data protection
  • Coding theory
  • Computer software
  • Coding theory
  • Computer science
  • Computer software
  • Data encryption (Computer science)
  • Data protection
Label
Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organization; Contents; Malicious Hashing: Eve's Variant of SHA-1; 1 Introduction; 2 Malicious Hashing; 2.1 Malicious Cryptography and Backdoors; 2.2 Definitions; 3 Eve's Variant of SHA-1; 3.1 Short Description of SHA-1; 3.2 Differential Attack Strategy for SHA-1; 3.3 Malicious Collision Attack; 4 Building Meaningful Collisions; 4.1 Constraints; 4.2 Binary File Format Overview; 4.3 Example Files; A Full Characteristic for Malicious SHA-1; References; Binary Elligator Squared; 1 Introduction; 2 Preliminaries; 2.1 Well-Bounded Encodings; 2.2 Elligator Squared
  • 2.3 Shallue -- van de Woestijne in Characteristic 22.4 Lambda Affine Coordinates; 3 Algorithmic Aspects; 3.1 The Subroutine SWCHAR2; 3.2 The Subroutine PREIMAGESSW; 3.3 Operation Counts; 4 Implementation Aspects; 5 Experimental Results; 6 Comparison of Elligator 2 and Elligator Squared on Prime Finite Fields; References; Batch NFS; 1 Introduction; 1.1 Contents of this paper.; 1.2 Security consequences.; 1.3 Previous work.; 2 Exponents; 2.1 QS: the Quadratic sieve (1982).; 2.2 NFS: the number-field sieve (1993).; 2.3 RAM cost analysis (1993).; 2.4 AT cost analysis (2001)
  • 2.5 The factorization factory (1993).2.6 Batch NFS (new).; 2.11 Comparison and numerical parameter optimization.; 3 Early-abort ECM; 3.1 Early-abort trial division.; 3.2 Early aborts in more generality.; 3.3 Performance of early aborts.; 3.4 Understanding the heuristics.; 3.5 Impact of early aborts on smoothness probabilities.; A ECM; References; An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X; 1 Introduction; 2 The Cipher FEAL-8X; 2.1 An Equivalent Description of FEAL-8X; 3 First Attack -- Finding the Key Using 215 Known Plaintexts
  • 3.1 The Linear Approximations3.2 The Basic Attack; 3.3 Matching Subkeys from the Backward and Forward Directions; 3.4 Retrieving the Rest of the Subkeys; 4 The Partitioning Technique -- Finding the Key Using 214 Known Plaintexts; 4.1 A Simplified Example; 4.2 The Attack; 5 Attacking FEAL-8X Using 210 Known Plaintexts with Complexity 262; 6 Attacks with a Few Known or Chosen Plaintexts; 6.1 Differential and Linear Exhaustive Search Attacks; 6.2 Meet in the Middle Attacks; 7 Summary; A Efficient Implementation; B The Linear Approximations Used in Our Attacks; References
  • Colliding Keys for SC2000-2561 Introduction; 2 Description of SC2000-256; 3 Key Collisions for SC2000-256; 3.1 Specifying the Difference for the Second Phase; 3.2 Finding Pairs in the First Phase; 4 Results and Applications; 5 Conclusion; References; Faster Binary-Field Multiplication and Faster Binary-Field MACs; 1 Introduction; 1.1 Integer-Multiplication Hardware; 1.2 New Speeds for Binary-Field MACs; 1.3 New Bit-Operation Records for Binary-Field Multiplication; 1.4 Polynomial-Multiplication Hardware: PCLMULQDQ; 2 Field Arithmetic in F28; 2.1 Review of Tower Fields
Control code
897803244
Extent
1 online resource.
Form of item
online
Isbn
9783319130514
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-13051-4
Specific material designation
remote
System control number
(OCoLC)897803244
Label
Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers, Antoine Joux, Amr Youssef (Eds.)
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organization; Contents; Malicious Hashing: Eve's Variant of SHA-1; 1 Introduction; 2 Malicious Hashing; 2.1 Malicious Cryptography and Backdoors; 2.2 Definitions; 3 Eve's Variant of SHA-1; 3.1 Short Description of SHA-1; 3.2 Differential Attack Strategy for SHA-1; 3.3 Malicious Collision Attack; 4 Building Meaningful Collisions; 4.1 Constraints; 4.2 Binary File Format Overview; 4.3 Example Files; A Full Characteristic for Malicious SHA-1; References; Binary Elligator Squared; 1 Introduction; 2 Preliminaries; 2.1 Well-Bounded Encodings; 2.2 Elligator Squared
  • 2.3 Shallue -- van de Woestijne in Characteristic 22.4 Lambda Affine Coordinates; 3 Algorithmic Aspects; 3.1 The Subroutine SWCHAR2; 3.2 The Subroutine PREIMAGESSW; 3.3 Operation Counts; 4 Implementation Aspects; 5 Experimental Results; 6 Comparison of Elligator 2 and Elligator Squared on Prime Finite Fields; References; Batch NFS; 1 Introduction; 1.1 Contents of this paper.; 1.2 Security consequences.; 1.3 Previous work.; 2 Exponents; 2.1 QS: the Quadratic sieve (1982).; 2.2 NFS: the number-field sieve (1993).; 2.3 RAM cost analysis (1993).; 2.4 AT cost analysis (2001)
  • 2.5 The factorization factory (1993).2.6 Batch NFS (new).; 2.11 Comparison and numerical parameter optimization.; 3 Early-abort ECM; 3.1 Early-abort trial division.; 3.2 Early aborts in more generality.; 3.3 Performance of early aborts.; 3.4 Understanding the heuristics.; 3.5 Impact of early aborts on smoothness probabilities.; A ECM; References; An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X; 1 Introduction; 2 The Cipher FEAL-8X; 2.1 An Equivalent Description of FEAL-8X; 3 First Attack -- Finding the Key Using 215 Known Plaintexts
  • 3.1 The Linear Approximations3.2 The Basic Attack; 3.3 Matching Subkeys from the Backward and Forward Directions; 3.4 Retrieving the Rest of the Subkeys; 4 The Partitioning Technique -- Finding the Key Using 214 Known Plaintexts; 4.1 A Simplified Example; 4.2 The Attack; 5 Attacking FEAL-8X Using 210 Known Plaintexts with Complexity 262; 6 Attacks with a Few Known or Chosen Plaintexts; 6.1 Differential and Linear Exhaustive Search Attacks; 6.2 Meet in the Middle Attacks; 7 Summary; A Efficient Implementation; B The Linear Approximations Used in Our Attacks; References
  • Colliding Keys for SC2000-2561 Introduction; 2 Description of SC2000-256; 3 Key Collisions for SC2000-256; 3.1 Specifying the Difference for the Second Phase; 3.2 Finding Pairs in the First Phase; 4 Results and Applications; 5 Conclusion; References; Faster Binary-Field Multiplication and Faster Binary-Field MACs; 1 Introduction; 1.1 Integer-Multiplication Hardware; 1.2 New Speeds for Binary-Field MACs; 1.3 New Bit-Operation Records for Binary-Field Multiplication; 1.4 Polynomial-Multiplication Hardware: PCLMULQDQ; 2 Field Arithmetic in F28; 2.1 Review of Tower Fields
Control code
897803244
Extent
1 online resource.
Form of item
online
Isbn
9783319130514
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-13051-4
Specific material designation
remote
System control number
(OCoLC)897803244

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...