top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou
Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (353 pages)
Disciplina 910.5
Collana Lecture Notes in Computer Science
Soggetto topico Finite fields (Algebra)
ISBN 3-031-22944-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Structures in Finite Fields -- On a conjecture on irreducible polynomials over finite fields with restricted coefficients -- On two applications of polynomials xk – cx – d over finite fields and more -- Efficient Finite Field Arithmetic -- Polynomial Constructions of Chudnovsky-Type Algorithms for Multiplication in Finite Fields with Linear Bilinear Complexity -- Reduction-free Multiplication for Finite Fields and Polynomial Rings -- Finite Field Arithmetic in Large Characteristic for Classical and Post-Quantum Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable Codes -- Optimal possibly nonlinear 3-PIR codes of small size -- PIR codes from combinatorial structures -- The Projective General Linear Group PGL(2, 5m) and Linear Codes of Length 5m + 1 -- Private Information Retrieval Schemes Using Cyclic Codes -- Two Classes of Optimal Few-Weight Codes over Fq + uFq -- Explicit Non-Malleable Codes from Bipartite Graphs -- Cryptography -- Algebraic Relation of Three MinRank Algebraic Modelings -- Decomposition of Dillon's APN permutation with efficient hardware implementation -- New Versions of Miller-loop Secured against Side-Channel Attacks -- A Class of Power Mappings with Low Boomerang Uniformity -- New Classes of Bent Functions via the Switching Method -- Sequences -- Correlation measure of binary sequence families with trace representation -- Linear complexity of generalized cyclotomic sequences with period pnqm -- On the 2-adic complexity of cyclotomic binary sequences with period p2 and 2p2.
Record Nr. UNISA-996508672203316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou
Arithmetic of finite fields : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29-September 2, 2022, revised selected papers / / edited by Sihem Mesnager, Zhengchun Zhou
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (353 pages)
Disciplina 910.5
Collana Lecture Notes in Computer Science
Soggetto topico Finite fields (Algebra)
ISBN 3-031-22944-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Structures in Finite Fields -- On a conjecture on irreducible polynomials over finite fields with restricted coefficients -- On two applications of polynomials xk – cx – d over finite fields and more -- Efficient Finite Field Arithmetic -- Polynomial Constructions of Chudnovsky-Type Algorithms for Multiplication in Finite Fields with Linear Bilinear Complexity -- Reduction-free Multiplication for Finite Fields and Polynomial Rings -- Finite Field Arithmetic in Large Characteristic for Classical and Post-Quantum Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable Codes -- Optimal possibly nonlinear 3-PIR codes of small size -- PIR codes from combinatorial structures -- The Projective General Linear Group PGL(2, 5m) and Linear Codes of Length 5m + 1 -- Private Information Retrieval Schemes Using Cyclic Codes -- Two Classes of Optimal Few-Weight Codes over Fq + uFq -- Explicit Non-Malleable Codes from Bipartite Graphs -- Cryptography -- Algebraic Relation of Three MinRank Algebraic Modelings -- Decomposition of Dillon's APN permutation with efficient hardware implementation -- New Versions of Miller-loop Secured against Side-Channel Attacks -- A Class of Power Mappings with Low Boomerang Uniformity -- New Classes of Bent Functions via the Switching Method -- Sequences -- Correlation measure of binary sequence families with trace representation -- Linear complexity of generalized cyclotomic sequences with period pnqm -- On the 2-adic complexity of cyclotomic binary sequences with period p2 and 2p2.
Record Nr. UNINA-9910644268303321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Arithmetic of Finite Fields [[electronic resource] ] : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş
Arithmetic of Finite Fields [[electronic resource] ] : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 213 p. 18 illus.)
Disciplina 512.74
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Discrete mathematics
Algorithms
Cryptography
Data encryption (Computer science)
Computer networks
Coding theory
Information theory
Symbolic and Algebraic Manipulation
Discrete Mathematics in Computer Science
Cryptology
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-16277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First Invited talk -- Computing Discrete Logarithms in F36•137 and F36•163 using Magma -- Finite Field Arithmetic -- Accelerating Iterative SpMV for the Discrete Logarithm Problem using GPUs -- Finding Optimal Chudnovsky-Chudnovsky Multiplication Algorithms -- Reducing the Complexity of Normal Basis Multiplication -- O -- Second Invited talk -- Open Questions on Nonlinearity and on APN functions -- Boolean and Vectorial Functions -- Some Results on Difference Balanced Functions -- Affine Equivalency and Nonlinearity Preserving Bijective Mappings over F2 -- On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions -- On o-Equivalence of Niho Bent Functions -- Third Invited Talk -- L-polynomials of the curve yqn− y = xqh+1− _ over Fqm -- Coding Theory and Code-based Cryptography -- Efficient Software Implementations of Code-based Hash Functions -- Quadratic residue codes over Fp + vFp + v2F.p.
Record Nr. UNISA-996198863003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Arithmetic of Finite Fields : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş
Arithmetic of Finite Fields : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers / / edited by Çetin Kaya Koç, Sihem Mesnager, Erkay Savaş
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 213 p. 18 illus.)
Disciplina 512.74
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Discrete mathematics
Algorithms
Cryptography
Data encryption (Computer science)
Computer networks
Coding theory
Information theory
Symbolic and Algebraic Manipulation
Discrete Mathematics in Computer Science
Cryptology
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-16277-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First Invited talk -- Computing Discrete Logarithms in F36•137 and F36•163 using Magma -- Finite Field Arithmetic -- Accelerating Iterative SpMV for the Discrete Logarithm Problem using GPUs -- Finding Optimal Chudnovsky-Chudnovsky Multiplication Algorithms -- Reducing the Complexity of Normal Basis Multiplication -- O -- Second Invited talk -- Open Questions on Nonlinearity and on APN functions -- Boolean and Vectorial Functions -- Some Results on Difference Balanced Functions -- Affine Equivalency and Nonlinearity Preserving Bijective Mappings over F2 -- On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions -- On o-Equivalence of Niho Bent Functions -- Third Invited Talk -- L-polynomials of the curve yqn− y = xqh+1− _ over Fqm -- Coding Theory and Code-based Cryptography -- Efficient Software Implementations of Code-based Hash Functions -- Quadratic residue codes over Fp + vFp + v2F.p.
Record Nr. UNINA-9910483504303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Codes, Cryptology and Information Security [[electronic resource] ] : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi
Codes, Cryptology and Information Security [[electronic resource] ] : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi
Autore El Hajji Said
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (415 pages)
Disciplina 003.54
Altri autori (Persone) MesnagerSihem
SouidiEl Mamoun
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
Soggetto non controllato Engineering
Technology & Engineering
ISBN 9783031330179
9783031330162
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.
Record Nr. UNISA-996534466003316
El Hajji Said  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Codes, Cryptology and Information Security : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi
Codes, Cryptology and Information Security : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi
Autore El Hajji Said
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (415 pages)
Disciplina 003.54
Altri autori (Persone) MesnagerSihem
SouidiEl Mamoun
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
Soggetto non controllato Engineering
Technology & Engineering
ISBN 9783031330179
9783031330162
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.
Record Nr. UNINA-9910726277903321
El Hajji Said  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors)
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (154 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networks - Security measures
ISBN 3-030-90553-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptanalysis and Other Attacks -- Higher Order c-Differentials -- 1 Introduction and Background -- 2 Preliminaries -- 3 Higher Order c-differentials -- 4 The Inverse Function -- 5 The Gold Function -- 6 Summary and Further Comments -- References -- First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES -- 1 Introduction -- 2 Boolean Masking Schemes Against Vertical SCAs -- 3 First-Order Vertical SCAs Against Masking Schemes -- 4 Experiments on a Real-World AES Code -- 4.1 Target Agnostic Analysis on CPU -- 4.2 Optimal Leakage Model -- 5 Discussion -- 6 Conclusions -- References -- Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure -- 1 Introduction -- 2 Related Works and Background -- 2.1 Overview -- 2.2 Notation -- 2.3 LWE/R-LWE Problems -- 2.4 Side-Channel Attacks on Lattice-Based Cryptography -- 2.5 Countermeasures -- 3 Analysis Methodology -- 3.1 Our Objective -- 3.2 Leakage Detection Test -- 4 Experimental Results -- 4.1 Flow -- 4.2 Analysis of CRYSTALS-Kyber - Reference Implementation -- 4.3 Analysis of Masked CRYSTALS-Kyber Implementation - Additive Masking -- 4.4 Analysis of Masked CRYSTALS-Kyber Implementation - Multiplicative Masking -- 4.5 Discussion -- 5 Conclusion -- References -- Symmetric Cryptography and Hash Functions, Mathematical Foundations of Cryptography -- A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances -- 1 Introduction -- 2 Description of the AES -- 3 Generating Suitable S-Boxes for Block Ciphers -- 3.1 A General Approach -- 3.2 A Proposal S-Box for AES -- 4 Algebraic and Statistical Properties of the Proposed S-Box -- 4.1 Bijectivity of the Proposed S-Box -- 4.2 Fixed Points and Opposite Points -- 4.3 Strict Avalanche Criterion and Distance to SAC -- 4.4 Periodicity of the Proposed S-Box.
4.5 Algebraic Complexity -- 5 Cryptanalysis of the Proposed S-Box -- 5.1 Equivalences of Our S-Box with the Inverse Function -- 5.2 Differential Cryptanalysis -- 5.3 Boomerang Cryptanalysis -- 5.4 Linear Cryptanalysis -- 5.5 Differential-Linear Connectivity Cryptanalysis -- 6 Comparison of Cryptographic Properties Between the Proposed S-Box and Former S-Boxes -- 6.1 Security -- 6.2 Efficiency -- 7 Conclusions -- References -- A Method of Integer Factorization -- 1 Introduction -- 2 Parity Conjecture and the Rank -- 2.1 Notations -- 2.2 Torsion Subgroups -- 2.3 Parity Conjecture -- 3 Two-Descent Method and Integer Factorization -- 4 2-Selmer Group and Integer Factorization -- 5 Experiment -- References -- Embedded Systems Security, Security in Hardware -- Towards a Black-Box Security Evaluation Framework -- 1 Introduction -- 2 Background -- 2.1 Security Evaluation Modes -- 2.2 Electro-Magnetic Fault Injection Attacks -- 3 Proposed Testing Framework -- 3.1 Fingerprinting -- 3.2 Target Exploration -- 3.3 Analysis Strategy -- 3.4 Benchmark Setup -- 3.5 Exploitation and Analysis -- 3.6 Evaluation Criteria -- 4 Experiments on a Real Device: Door-Lock Unlock -- 5 Discussion -- 6 Conclusion -- References -- Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 2 Background -- 2.1 Fault Injection Attacks -- 2.2 Detecting Fault Attacks with Machine Learning -- 3 Proposed Methodology and Design Idea -- 3.1 Digital Sensor -- 3.2 Smart Monitor -- 3.3 Dataset Information -- 3.4 Machine Learning Based Evaluation Using Two-Stage Detection Framework -- 3.5 Hardware Testing of the Design Using HLS -- 4 Results -- 4.1 Threshold Optimization of Every DS -- 4.2 Classification Between EMFI and Nominal Condition -- 4.3 Classification Between CGFI and Nominal Condition.
4.4 Classification Between Combined EMFI and CGFI Against Nominal Condition -- 4.5 Classification Based on Attack Type Between EMFI and CGFI -- 5 Conclusion -- References -- Authentication, Key Management, Public Key (Asymmetric) Techniques, Information-Theoretic Techniques -- Secure Multi-Party Computation Using Pre-distributed Information from an Initializer -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 1.3 Outline -- 2 Model -- 2.1 Shamir's Secret Sharing Scheme -- 2.2 Security Conditions -- 3 The Protocol -- 3.1 Pre-processing Phase -- 3.2 Computation Phase -- 4 Conclusion -- References -- Evolving Secret Sharing in Almost Semi-honest Model -- 1 Introduction -- 1.1 Threshold Evolving Secret Sharing -- 2 Hash Functions -- 3 The `Almost' Semi-honest Model -- 4 Our Construction -- 5 Concluding Remarks -- References -- Traceable and Verifier-Local Revocable Attribute-Based Signature with Constant Length -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Contribution and Strategy -- 1.4 Outline -- 2 Preliminaries -- 2.1 Bilinear Maps and Number Theoretic Assumptions -- 2.2 Access Structure ch10DBLP:confspsccsspsGoyalPSW06 -- 3 Traceable and Verifier-Local Revocable Attribute-Based Signature Scheme (TVLR-ABS): Definitions and Security -- 3.1 Oracles and Security Experiments -- 4 Cryptographic Tools -- 4.1 Two-Level Hierarchical Signature Scheme ch10DBLP:confspspkcspsBoyenW07 -- 4.2 Access Tree Secret Values Assigned -- 4.3 GS Non-interactive Proof Systems -- 5 Construction of TVLR-ABS -- 6 Security Analysis -- 6.1 Comparison -- 7 Conclusion -- References -- Correction to: Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure.
Correction to: Chapter "Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure" in: P. Stănică et al. (Eds.): Security and Privacy, CCIS 1497, https://doi.org/10.1007/978-3-030-90553-8_3 -- Author Index.
Record Nr. UNISA-996464527603316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors)
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, proceedings / / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (154 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networks - Security measures
ISBN 3-030-90553-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptanalysis and Other Attacks -- Higher Order c-Differentials -- 1 Introduction and Background -- 2 Preliminaries -- 3 Higher Order c-differentials -- 4 The Inverse Function -- 5 The Gold Function -- 6 Summary and Further Comments -- References -- First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES -- 1 Introduction -- 2 Boolean Masking Schemes Against Vertical SCAs -- 3 First-Order Vertical SCAs Against Masking Schemes -- 4 Experiments on a Real-World AES Code -- 4.1 Target Agnostic Analysis on CPU -- 4.2 Optimal Leakage Model -- 5 Discussion -- 6 Conclusions -- References -- Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure -- 1 Introduction -- 2 Related Works and Background -- 2.1 Overview -- 2.2 Notation -- 2.3 LWE/R-LWE Problems -- 2.4 Side-Channel Attacks on Lattice-Based Cryptography -- 2.5 Countermeasures -- 3 Analysis Methodology -- 3.1 Our Objective -- 3.2 Leakage Detection Test -- 4 Experimental Results -- 4.1 Flow -- 4.2 Analysis of CRYSTALS-Kyber - Reference Implementation -- 4.3 Analysis of Masked CRYSTALS-Kyber Implementation - Additive Masking -- 4.4 Analysis of Masked CRYSTALS-Kyber Implementation - Multiplicative Masking -- 4.5 Discussion -- 5 Conclusion -- References -- Symmetric Cryptography and Hash Functions, Mathematical Foundations of Cryptography -- A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances -- 1 Introduction -- 2 Description of the AES -- 3 Generating Suitable S-Boxes for Block Ciphers -- 3.1 A General Approach -- 3.2 A Proposal S-Box for AES -- 4 Algebraic and Statistical Properties of the Proposed S-Box -- 4.1 Bijectivity of the Proposed S-Box -- 4.2 Fixed Points and Opposite Points -- 4.3 Strict Avalanche Criterion and Distance to SAC -- 4.4 Periodicity of the Proposed S-Box.
4.5 Algebraic Complexity -- 5 Cryptanalysis of the Proposed S-Box -- 5.1 Equivalences of Our S-Box with the Inverse Function -- 5.2 Differential Cryptanalysis -- 5.3 Boomerang Cryptanalysis -- 5.4 Linear Cryptanalysis -- 5.5 Differential-Linear Connectivity Cryptanalysis -- 6 Comparison of Cryptographic Properties Between the Proposed S-Box and Former S-Boxes -- 6.1 Security -- 6.2 Efficiency -- 7 Conclusions -- References -- A Method of Integer Factorization -- 1 Introduction -- 2 Parity Conjecture and the Rank -- 2.1 Notations -- 2.2 Torsion Subgroups -- 2.3 Parity Conjecture -- 3 Two-Descent Method and Integer Factorization -- 4 2-Selmer Group and Integer Factorization -- 5 Experiment -- References -- Embedded Systems Security, Security in Hardware -- Towards a Black-Box Security Evaluation Framework -- 1 Introduction -- 2 Background -- 2.1 Security Evaluation Modes -- 2.2 Electro-Magnetic Fault Injection Attacks -- 3 Proposed Testing Framework -- 3.1 Fingerprinting -- 3.2 Target Exploration -- 3.3 Analysis Strategy -- 3.4 Benchmark Setup -- 3.5 Exploitation and Analysis -- 3.6 Evaluation Criteria -- 4 Experiments on a Real Device: Door-Lock Unlock -- 5 Discussion -- 6 Conclusion -- References -- Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 2 Background -- 2.1 Fault Injection Attacks -- 2.2 Detecting Fault Attacks with Machine Learning -- 3 Proposed Methodology and Design Idea -- 3.1 Digital Sensor -- 3.2 Smart Monitor -- 3.3 Dataset Information -- 3.4 Machine Learning Based Evaluation Using Two-Stage Detection Framework -- 3.5 Hardware Testing of the Design Using HLS -- 4 Results -- 4.1 Threshold Optimization of Every DS -- 4.2 Classification Between EMFI and Nominal Condition -- 4.3 Classification Between CGFI and Nominal Condition.
4.4 Classification Between Combined EMFI and CGFI Against Nominal Condition -- 4.5 Classification Based on Attack Type Between EMFI and CGFI -- 5 Conclusion -- References -- Authentication, Key Management, Public Key (Asymmetric) Techniques, Information-Theoretic Techniques -- Secure Multi-Party Computation Using Pre-distributed Information from an Initializer -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 1.3 Outline -- 2 Model -- 2.1 Shamir's Secret Sharing Scheme -- 2.2 Security Conditions -- 3 The Protocol -- 3.1 Pre-processing Phase -- 3.2 Computation Phase -- 4 Conclusion -- References -- Evolving Secret Sharing in Almost Semi-honest Model -- 1 Introduction -- 1.1 Threshold Evolving Secret Sharing -- 2 Hash Functions -- 3 The `Almost' Semi-honest Model -- 4 Our Construction -- 5 Concluding Remarks -- References -- Traceable and Verifier-Local Revocable Attribute-Based Signature with Constant Length -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Contribution and Strategy -- 1.4 Outline -- 2 Preliminaries -- 2.1 Bilinear Maps and Number Theoretic Assumptions -- 2.2 Access Structure ch10DBLP:confspsccsspsGoyalPSW06 -- 3 Traceable and Verifier-Local Revocable Attribute-Based Signature Scheme (TVLR-ABS): Definitions and Security -- 3.1 Oracles and Security Experiments -- 4 Cryptographic Tools -- 4.1 Two-Level Hierarchical Signature Scheme ch10DBLP:confspspkcspsBoyenW07 -- 4.2 Access Tree Secret Values Assigned -- 4.3 GS Non-interactive Proof Systems -- 5 Construction of TVLR-ABS -- 6 Security Analysis -- 6.1 Comparison -- 7 Conclusion -- References -- Correction to: Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure.
Correction to: Chapter "Side-Channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure" in: P. Stănică et al. (Eds.): Security and Privacy, CCIS 1497, https://doi.org/10.1007/978-3-030-90553-8_3 -- Author Index.
Record Nr. UNINA-9910508434703321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui