Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (353 pages) |
Disciplina | 910.5 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Finite fields (Algebra) |
ISBN | 3-031-22944-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Structures in Finite Fields -- On a conjecture on irreducible polynomials over finite fields with restricted coefficients -- On two applications of polynomials xk – cx – d over finite fields and more -- Efficient Finite Field Arithmetic -- Polynomial Constructions of Chudnovsky-Type Algorithms for Multiplication in Finite Fields with Linear Bilinear Complexity -- Reduction-free Multiplication for Finite Fields and Polynomial Rings -- Finite Field Arithmetic in Large Characteristic for Classical and Post-Quantum Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable Codes -- Optimal possibly nonlinear 3-PIR codes of small size -- PIR codes from combinatorial structures -- The Projective General Linear Group PGL(2, 5m) and Linear Codes of Length 5m + 1 -- Private Information Retrieval Schemes Using Cyclic Codes -- Two Classes of Optimal Few-Weight Codes over Fq + uFq -- Explicit Non-Malleable Codes from Bipartite Graphs -- Cryptography -- Algebraic Relation of Three MinRank Algebraic Modelings -- Decomposition of Dillon's APN permutation with efficient hardware implementation -- New Versions of Miller-loop Secured against Side-Channel Attacks -- A Class of Power Mappings with Low Boomerang Uniformity -- New Classes of Bent Functions via the Switching Method -- Sequences -- Correlation measure of binary sequence families with trace representation -- Linear complexity of generalized cyclotomic sequences with period pnqm -- On the 2-adic complexity of cyclotomic binary sequences with period p2 and 2p2. |
Record Nr. | UNISA-996508672203316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (353 pages) |
Disciplina | 910.5 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Finite fields (Algebra) |
ISBN | 3-031-22944-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Structures in Finite Fields -- On a conjecture on irreducible polynomials over finite fields with restricted coefficients -- On two applications of polynomials xk – cx – d over finite fields and more -- Efficient Finite Field Arithmetic -- Polynomial Constructions of Chudnovsky-Type Algorithms for Multiplication in Finite Fields with Linear Bilinear Complexity -- Reduction-free Multiplication for Finite Fields and Polynomial Rings -- Finite Field Arithmetic in Large Characteristic for Classical and Post-Quantum Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable Codes -- Optimal possibly nonlinear 3-PIR codes of small size -- PIR codes from combinatorial structures -- The Projective General Linear Group PGL(2, 5m) and Linear Codes of Length 5m + 1 -- Private Information Retrieval Schemes Using Cyclic Codes -- Two Classes of Optimal Few-Weight Codes over Fq + uFq -- Explicit Non-Malleable Codes from Bipartite Graphs -- Cryptography -- Algebraic Relation of Three MinRank Algebraic Modelings -- Decomposition of Dillon's APN permutation with efficient hardware implementation -- New Versions of Miller-loop Secured against Side-Channel Attacks -- A Class of Power Mappings with Low Boomerang Uniformity -- New Classes of Bent Functions via the Switching Method -- Sequences -- Correlation measure of binary sequence families with trace representation -- Linear complexity of generalized cyclotomic sequences with period pnqm -- On the 2-adic complexity of cyclotomic binary sequences with period p2 and 2p2. |
Record Nr. | UNINA-9910644268303321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Arithmetic of Finite Fields [[electronic resource] ] : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 213 p. 18 illus.) |
Disciplina | 512.74 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Discrete mathematics Algorithms Cryptography Data encryption (Computer science) Computer networks Coding theory Information theory Symbolic and Algebraic Manipulation Discrete Mathematics in Computer Science Cryptology Computer Communication Networks Coding and Information Theory |
ISBN | 3-319-16277-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | First Invited talk -- Computing Discrete Logarithms in F36•137 and F36•163 using Magma -- Finite Field Arithmetic -- Accelerating Iterative SpMV for the Discrete Logarithm Problem using GPUs -- Finding Optimal Chudnovsky-Chudnovsky Multiplication Algorithms -- Reducing the Complexity of Normal Basis Multiplication -- O -- Second Invited talk -- Open Questions on Nonlinearity and on APN functions -- Boolean and Vectorial Functions -- Some Results on Difference Balanced Functions -- Affine Equivalency and Nonlinearity Preserving Bijective Mappings over F2 -- On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions -- On o-Equivalence of Niho Bent Functions -- Third Invited Talk -- L-polynomials of the curve yqn− y = xqh+1− _ over Fqm -- Coding Theory and Code-based Cryptography -- Efficient Software Implementations of Code-based Hash Functions -- Quadratic residue codes over Fp + vFp + v2F.p. |
Record Nr. | UNISA-996198863003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Arithmetic of Finite Fields : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 213 p. 18 illus.) |
Disciplina | 512.74 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Discrete mathematics Algorithms Cryptography Data encryption (Computer science) Computer networks Coding theory Information theory Symbolic and Algebraic Manipulation Discrete Mathematics in Computer Science Cryptology Computer Communication Networks Coding and Information Theory |
ISBN | 3-319-16277-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | First Invited talk -- Computing Discrete Logarithms in F36•137 and F36•163 using Magma -- Finite Field Arithmetic -- Accelerating Iterative SpMV for the Discrete Logarithm Problem using GPUs -- Finding Optimal Chudnovsky-Chudnovsky Multiplication Algorithms -- Reducing the Complexity of Normal Basis Multiplication -- O -- Second Invited talk -- Open Questions on Nonlinearity and on APN functions -- Boolean and Vectorial Functions -- Some Results on Difference Balanced Functions -- Affine Equivalency and Nonlinearity Preserving Bijective Mappings over F2 -- On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions -- On o-Equivalence of Niho Bent Functions -- Third Invited Talk -- L-polynomials of the curve yqn− y = xqh+1− _ over Fqm -- Coding Theory and Code-based Cryptography -- Efficient Software Implementations of Code-based Hash Functions -- Quadratic residue codes over Fp + vFp + v2F.p. |
Record Nr. | UNINA-9910483504303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Codes, Cryptology and Information Security [[electronic resource] ] : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi |
Autore | El Hajji Said |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (415 pages) |
Disciplina | 003.54 |
Altri autori (Persone) |
MesnagerSihem
SouidiEl Mamoun |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
Soggetto non controllato |
Engineering
Technology & Engineering |
ISBN |
9783031330179
9783031330162 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes. |
Record Nr. | UNISA-996534466003316 |
El Hajji Said | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Codes, Cryptology and Information Security : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi |
Autore | El Hajji Said |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (415 pages) |
Disciplina | 003.54 |
Altri autori (Persone) |
MesnagerSihem
SouidiEl Mamoun |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
Soggetto non controllato |
Engineering
Technology & Engineering |
ISBN |
9783031330179
9783031330162 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes. |
Record Nr. | UNINA-9910726277903321 |
El Hajji Said | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (154 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 3-030-90553-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Cryptanalysis and Other Attacks -- Higher Order c-Differentials -- 1 Introduction and Background -- 2 Preliminaries -- 3 Higher Order c-differentials -- 4 The Inverse Function -- 5 The Gold Function -- 6 Summary and Further Comments -- References -- First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES -- 1 Introduction -- 2 Boolean Masking Schemes Against Vertical SCAs -- 3 First-Order Vertical SCAs Against Masking Schemes -- 4 Experiments on a Real-World AES Code -- 4.1 Target Agnostic Analysis on CPU -- 4.2 Optimal Leakage Model -- 5 Discussion -- 6 Conclusions -- References -- Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure -- 1 Introduction -- 2 Related Works and Background -- 2.1 Overview -- 2.2 Notation -- 2.3 LWE/R-LWE Problems -- 2.4 Side-Channel Attacks on Lattice-Based Cryptography -- 2.5 Countermeasures -- 3 Analysis Methodology -- 3.1 Our Objective -- 3.2 Leakage Detection Test -- 4 Experimental Results -- 4.1 Flow -- 4.2 Analysis of CRYSTALS-Kyber - Reference Implementation -- 4.3 Analysis of Masked CRYSTALS-Kyber Implementation - Additive Masking -- 4.4 Analysis of Masked CRYSTALS-Kyber Implementation - Multiplicative Masking -- 4.5 Discussion -- 5 Conclusion -- References -- Symmetric Cryptography and Hash Functions, Mathematical Foundations of Cryptography -- A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances -- 1 Introduction -- 2 Description of the AES -- 3 Generating Suitable S-Boxes for Block Ciphers -- 3.1 A General Approach -- 3.2 A Proposal S-Box for AES -- 4 Algebraic and Statistical Properties of the Proposed S-Box -- 4.1 Bijectivity of the Proposed S-Box -- 4.2 Fixed Points and Opposite Points -- 4.3 Strict Avalanche Criterion and Distance to SAC -- 4.4 Periodicity of the Proposed S-Box.
4.5 Algebraic Complexity -- 5 Cryptanalysis of the Proposed S-Box -- 5.1 Equivalences of Our S-Box with the Inverse Function -- 5.2 Differential Cryptanalysis -- 5.3 Boomerang Cryptanalysis -- 5.4 Linear Cryptanalysis -- 5.5 Differential-Linear Connectivity Cryptanalysis -- 6 Comparison of Cryptographic Properties Between the Proposed S-Box and Former S-Boxes -- 6.1 Security -- 6.2 Efficiency -- 7 Conclusions -- References -- A Method of Integer Factorization -- 1 Introduction -- 2 Parity Conjecture and the Rank -- 2.1 Notations -- 2.2 Torsion Subgroups -- 2.3 Parity Conjecture -- 3 Two-Descent Method and Integer Factorization -- 4 2-Selmer Group and Integer Factorization -- 5 Experiment -- References -- Embedded Systems Security, Security in Hardware -- Towards a Black-Box Security Evaluation Framework -- 1 Introduction -- 2 Background -- 2.1 Security Evaluation Modes -- 2.2 Electro-Magnetic Fault Injection Attacks -- 3 Proposed Testing Framework -- 3.1 Fingerprinting -- 3.2 Target Exploration -- 3.3 Analysis Strategy -- 3.4 Benchmark Setup -- 3.5 Exploitation and Analysis -- 3.6 Evaluation Criteria -- 4 Experiments on a Real Device: Door-Lock Unlock -- 5 Discussion -- 6 Conclusion -- References -- Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 2 Background -- 2.1 Fault Injection Attacks -- 2.2 Detecting Fault Attacks with Machine Learning -- 3 Proposed Methodology and Design Idea -- 3.1 Digital Sensor -- 3.2 Smart Monitor -- 3.3 Dataset Information -- 3.4 Machine Learning Based Evaluation Using Two-Stage Detection Framework -- 3.5 Hardware Testing of the Design Using HLS -- 4 Results -- 4.1 Threshold Optimization of Every DS -- 4.2 Classification Between EMFI and Nominal Condition -- 4.3 Classification Between CGFI and Nominal Condition. 4.4 Classification Between Combined EMFI and CGFI Against Nominal Condition -- 4.5 Classification Based on Attack Type Between EMFI and CGFI -- 5 Conclusion -- References -- Authentication, Key Management, Public Key (Asymmetric) Techniques, Information-Theoretic Techniques -- Secure Multi-Party Computation Using Pre-distributed Information from an Initializer -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 1.3 Outline -- 2 Model -- 2.1 Shamir's Secret Sharing Scheme -- 2.2 Security Conditions -- 3 The Protocol -- 3.1 Pre-processing Phase -- 3.2 Computation Phase -- 4 Conclusion -- References -- Evolving Secret Sharing in Almost Semi-honest Model -- 1 Introduction -- 1.1 Threshold Evolving Secret Sharing -- 2 Hash Functions -- 3 The `Almost' Semi-honest Model -- 4 Our Construction -- 5 Concluding Remarks -- References -- Traceable and Verifier-Local Revocable Attribute-Based Signature with Constant Length -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Contribution and Strategy -- 1.4 Outline -- 2 Preliminaries -- 2.1 Bilinear Maps and Number Theoretic Assumptions -- 2.2 Access Structure ch10DBLP:confspsccsspsGoyalPSW06 -- 3 Traceable and Verifier-Local Revocable Attribute-Based Signature Scheme (TVLR-ABS): Definitions and Security -- 3.1 Oracles and Security Experiments -- 4 Cryptographic Tools -- 4.1 Two-Level Hierarchical Signature Scheme ch10DBLP:confspspkcspsBoyenW07 -- 4.2 Access Tree Secret Values Assigned -- 4.3 GS Non-interactive Proof Systems -- 5 Construction of TVLR-ABS -- 6 Security Analysis -- 6.1 Comparison -- 7 Conclusion -- References -- Correction to: Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure. Correction to: Chapter "Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure" in: P. Stănică et al. (Eds.): Security and Privacy, CCIS 1497, https://doi.org/10.1007/978-3-030-90553-8_3 -- Author Index. |
Record Nr. | UNISA-996464527603316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (154 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 3-030-90553-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Cryptanalysis and Other Attacks -- Higher Order c-Differentials -- 1 Introduction and Background -- 2 Preliminaries -- 3 Higher Order c-differentials -- 4 The Inverse Function -- 5 The Gold Function -- 6 Summary and Further Comments -- References -- First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES -- 1 Introduction -- 2 Boolean Masking Schemes Against Vertical SCAs -- 3 First-Order Vertical SCAs Against Masking Schemes -- 4 Experiments on a Real-World AES Code -- 4.1 Target Agnostic Analysis on CPU -- 4.2 Optimal Leakage Model -- 5 Discussion -- 6 Conclusions -- References -- Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure -- 1 Introduction -- 2 Related Works and Background -- 2.1 Overview -- 2.2 Notation -- 2.3 LWE/R-LWE Problems -- 2.4 Side-Channel Attacks on Lattice-Based Cryptography -- 2.5 Countermeasures -- 3 Analysis Methodology -- 3.1 Our Objective -- 3.2 Leakage Detection Test -- 4 Experimental Results -- 4.1 Flow -- 4.2 Analysis of CRYSTALS-Kyber - Reference Implementation -- 4.3 Analysis of Masked CRYSTALS-Kyber Implementation - Additive Masking -- 4.4 Analysis of Masked CRYSTALS-Kyber Implementation - Multiplicative Masking -- 4.5 Discussion -- 5 Conclusion -- References -- Symmetric Cryptography and Hash Functions, Mathematical Foundations of Cryptography -- A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances -- 1 Introduction -- 2 Description of the AES -- 3 Generating Suitable S-Boxes for Block Ciphers -- 3.1 A General Approach -- 3.2 A Proposal S-Box for AES -- 4 Algebraic and Statistical Properties of the Proposed S-Box -- 4.1 Bijectivity of the Proposed S-Box -- 4.2 Fixed Points and Opposite Points -- 4.3 Strict Avalanche Criterion and Distance to SAC -- 4.4 Periodicity of the Proposed S-Box.
4.5 Algebraic Complexity -- 5 Cryptanalysis of the Proposed S-Box -- 5.1 Equivalences of Our S-Box with the Inverse Function -- 5.2 Differential Cryptanalysis -- 5.3 Boomerang Cryptanalysis -- 5.4 Linear Cryptanalysis -- 5.5 Differential-Linear Connectivity Cryptanalysis -- 6 Comparison of Cryptographic Properties Between the Proposed S-Box and Former S-Boxes -- 6.1 Security -- 6.2 Efficiency -- 7 Conclusions -- References -- A Method of Integer Factorization -- 1 Introduction -- 2 Parity Conjecture and the Rank -- 2.1 Notations -- 2.2 Torsion Subgroups -- 2.3 Parity Conjecture -- 3 Two-Descent Method and Integer Factorization -- 4 2-Selmer Group and Integer Factorization -- 5 Experiment -- References -- Embedded Systems Security, Security in Hardware -- Towards a Black-Box Security Evaluation Framework -- 1 Introduction -- 2 Background -- 2.1 Security Evaluation Modes -- 2.2 Electro-Magnetic Fault Injection Attacks -- 3 Proposed Testing Framework -- 3.1 Fingerprinting -- 3.2 Target Exploration -- 3.3 Analysis Strategy -- 3.4 Benchmark Setup -- 3.5 Exploitation and Analysis -- 3.6 Evaluation Criteria -- 4 Experiments on a Real Device: Door-Lock Unlock -- 5 Discussion -- 6 Conclusion -- References -- Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 2 Background -- 2.1 Fault Injection Attacks -- 2.2 Detecting Fault Attacks with Machine Learning -- 3 Proposed Methodology and Design Idea -- 3.1 Digital Sensor -- 3.2 Smart Monitor -- 3.3 Dataset Information -- 3.4 Machine Learning Based Evaluation Using Two-Stage Detection Framework -- 3.5 Hardware Testing of the Design Using HLS -- 4 Results -- 4.1 Threshold Optimization of Every DS -- 4.2 Classification Between EMFI and Nominal Condition -- 4.3 Classification Between CGFI and Nominal Condition. 4.4 Classification Between Combined EMFI and CGFI Against Nominal Condition -- 4.5 Classification Based on Attack Type Between EMFI and CGFI -- 5 Conclusion -- References -- Authentication, Key Management, Public Key (Asymmetric) Techniques, Information-Theoretic Techniques -- Secure Multi-Party Computation Using Pre-distributed Information from an Initializer -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 1.3 Outline -- 2 Model -- 2.1 Shamir's Secret Sharing Scheme -- 2.2 Security Conditions -- 3 The Protocol -- 3.1 Pre-processing Phase -- 3.2 Computation Phase -- 4 Conclusion -- References -- Evolving Secret Sharing in Almost Semi-honest Model -- 1 Introduction -- 1.1 Threshold Evolving Secret Sharing -- 2 Hash Functions -- 3 The `Almost' Semi-honest Model -- 4 Our Construction -- 5 Concluding Remarks -- References -- Traceable and Verifier-Local Revocable Attribute-Based Signature with Constant Length -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Contribution and Strategy -- 1.4 Outline -- 2 Preliminaries -- 2.1 Bilinear Maps and Number Theoretic Assumptions -- 2.2 Access Structure ch10DBLP:confspsccsspsGoyalPSW06 -- 3 Traceable and Verifier-Local Revocable Attribute-Based Signature Scheme (TVLR-ABS): Definitions and Security -- 3.1 Oracles and Security Experiments -- 4 Cryptographic Tools -- 4.1 Two-Level Hierarchical Signature Scheme ch10DBLP:confspspkcspsBoyenW07 -- 4.2 Access Tree Secret Values Assigned -- 4.3 GS Non-interactive Proof Systems -- 5 Construction of TVLR-ABS -- 6 Security Analysis -- 6.1 Comparison -- 7 Conclusion -- References -- Correction to: Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure. Correction to: Chapter "Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure" in: P. Stănică et al. (Eds.): Security and Privacy, CCIS 1497, https://doi.org/10.1007/978-3-030-90553-8_3 -- Author Index. |
Record Nr. | UNINA-9910508434703321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|