Muutke küpsiste eelistusi

Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II 1st ed. 2015 [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 783 pages, kõrgus x laius: 235x155 mm, 76 Illustrations, black and white; XVIII, 783 p. 76 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 9216
  • Ilmumisaeg: 11-Aug-2015
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662479990
  • ISBN-13: 9783662479995
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 783 pages, kõrgus x laius: 235x155 mm, 76 Illustrations, black and white; XVIII, 783 p. 76 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 9216
  • Ilmumisaeg: 11-Aug-2015
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662479990
  • ISBN-13: 9783662479995
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015.

The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.
Lattice-Based Cryptography
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
3(20)
Thijs Laarhoven
Coded-BKW: Solving LWE Using Lattice Codes
23(20)
Qian Guo
Thomas Johansson
Paul Stankovski
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
43(20)
Paul Kirchner
Pierre-Alain Fouque
Provably Weak Instances of Ring-LWE
63(32)
Yara Elias
Kristin E. Lauter
Ekin Ozman
Katherine E. Stange
Cryptanalytic Insights
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
95(21)
Bing Sun
Zhiqiang Liu
Vincent Rijmen
Ruilin Li
Lei Cheng
Qingju Wang
Hoda Alkhzaimi
Chao Li
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
116(25)
Alex Biryukov
Leo Perrin
Capacity and Data Complexity in Multidimensional Linear Attack
141(20)
Jialin Huang
Serge Vaudenay
Xuejia Lai
Kaisa Nyberg
Observations on the SIMON Block Cipher Family
161(28)
Stefan Kolbl
Gregor Leander
Tyge Tiessen
Modes and Constructions
Tweaking Even-Mansour Ciphers
189(20)
Benoit Cogliati
Rodolphe Lampe
Yannick Seurin
Multi-key Security: The Even-Mansour Construction Revisited
209(15)
Nicky Mouha
Atul Luykx
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
224(23)
Mohammad Hajiabadi
Bruce M. Kapron
Multilinear Maps and IO
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
247(20)
Jean-Sebastien Coron
Craig Gentry
Shai Halevi
Tancrede Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
New Multilinear Maps Over the Integers
267(20)
Jean-Sebastien Coron
Tancrede Lepoint
Mehdi Tibouchi
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
287(21)
Kai-Min Chung
Huijia Lin
Rafael Pass
Indistinguishability Obfuscation from Compact Functional Encryption
308(21)
Prabhanjan Ananth
Abhishek Jain
Pseudorandomness
Efficient Pseudorandom Functions via On-the-Fly Adaptation
329(22)
Nico Dottling
Dominique Schroder
The Iterated Random Permutation Problem with Applications to Cascade Encryption
351(17)
Brice Minaud
Yannick Seurin
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
368(20)
Peter Gazi
Krzysztof Pietrzak
Stefano Tessaro
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
388(25)
Michel Abdalla
Fabrice Benhamouda
Alain Passelegue
Block Cipher Cryptanalysis
Integral Cryptanalysis on Full MISTY1
413(20)
Yosuke Todo
New Attacks on Feistel Structures with Improved Memory Complexities
433(22)
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Known-Key Distinguisher on Full PRESENT
455(20)
Celine Blondeau
Thomas Peyrin
Lei Wang
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
475(18)
Henri Gilbert
Jerome Plut
Joana Treger
Integrity
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
493(25)
Viet Tung Hoang
Reza Reyhanitabar
Phillip Rogaway
Damian Vizar
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More
518(20)
Avradip Mandal
Arnab Roy
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
538(23)
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
Assumptions
Cryptanalysis of the Co-ACD Assumption
561(20)
Pierre-Alain Fouque
Moon Sung Lee
Tancrede Lepoint
Mehdi Tibouchi
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP
581(20)
Ming-Deh A. Huang
Michiel Kosters
Sze Ling Yeo
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
601(22)
Georg Fuchsbauer
Zahra Jafargholi
Krzysztof Pietrzak
Hash Functions and Stream Cipher Cryptanalysis
Practical Free-Start Collision Attacks on 76-step SHA-1
623(20)
Pierre Karpman
Thomas Peyrin
Marc Stevens
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
643(20)
Bin Zhang
Chao Xu
Willi Meier
Cryptanalysis of Full Sprout
663(20)
Virginie Lallemand
Maria Naya-Plasencia
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
683(22)
Thomas Espitau
Pierre-Alain Fouque
Pierre Karpman
Implementations
Decaf: Eliminating Cofactors Through Point Compression
705(19)
Mike Hamburg
Actively Secure OT Extension with Optimal Overhead
724(18)
Marcel Keller
Emmanuela Orsini
Peter Scholl
Algebraic Decomposition for Probing Security
742(22)
Claude Carlet
Emmanuel Prouff
Matthieu Rivain
Thomas Roche
Consolidating Masking Schemes
764(21)
Oscar Reparaz
Begul Bilgin
Svetla Nikova
Benedikt Gierlichs
Ingrid Verbauwhede
Author Index 785