LEADER 04601nam 22007335 450 001 9910857783903321 005 20251113182916.0 010 $a9783031584114 010 $a3031584112 024 7 $a10.1007/978-3-031-58411-4 035 $a(CKB)32027832300041 035 $a(MiAaPQ)EBC31342682 035 $a(Au-PeEL)EBL31342682 035 $a(MiAaPQ)EBC31338515 035 $a(Au-PeEL)EBL31338515 035 $a(DE-He213)978-3-031-58411-4 035 $a(OCoLC)1433655968 035 $a(EXLCZ)9932027832300041 100 $a20240512d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSelected Areas in Cryptography $e29th International Conference, SAC 2022, Windsor, ON, Canada, August 24?26, 2022, Revised Selected Papers /$fedited by Benjamin Smith, Huapeng Wu 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (485 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13742 311 08$a9783031584107 311 08$a3031584104 327 $a1 Lattices and ECC -- Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All -- On the Weakness of Ring-LWE mod Prime Ideal q by Trace Map -- 2D-GLS: Faster and Exception-free Scalar Multiplication in the GLS254 Binary Curve -- 2 Differential Cryptanalysis -- Key-Recovery Attacks on CRAFT and WARP -- Differential Analysis of the Ternary Hash Function Troika -- Another Look at Differential-Linear Attacks -- 3 Cryptographic Primitives -- Rank Metric Trapdoor Functions with Homogeneous Errors -- PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords -- Improved Circuit-based PSI via Equality Preserving -- 4 Isogeny-Based Cryptography I -- Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge -- Patient Zero: Zero-Value Attacks on CSIDH and Variants -- An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves -- 5 Block Ciphers -- Finding All Impossible Differentials When Considering the DDT -- A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair -- Collision-Based Attacks on White-Box AES Implementations -- 6 Differential Cryptanalysis II -- Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN -- Improving the Automated Evaluation Algorithm against Differential Attacks and Application to WARP -- 7 Isogeny-based Cryptography II -- Faster Cryptographic Hash Function from Supersingular Isogeny Graphs -- 8 Protocols and PRFs -- From Plaintext-extractability to IND-CCA Security -- Farasha: A Provable Permutation-based Parallelizable PRF -- A Sponge-Based PRF with Good Multi-user Security. 330 $aThis book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24?26, 2022. The 21 full papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are categorized into the following topical sections: lattices and ECC; differential cryptanalysis; cryptographic primitives; isogeny-based cryptography I; block ciphers; differential cryptanalysis II; isogeny-based cryptography II; and protocols and PRFs. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13742 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aSecurity Services 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a005.8 700 $aSmith$b Benjamin$01390568 701 $aWu$b Huapeng$01738830 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910857783903321 996 $aSelected Areas in Cryptography$94161856 997 $aUNINA