Cryptography and information security in the Balkans : second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers / Enes Pasalic, Lars R. Knudsen (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 9540. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Switzerland : Springer, 2016Description: 1 online resource (viii, 207 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319291727
- 3319291726
- BalkanCryptSec 2015
- 005.8/2 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed April 6, 2016).
Intro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions
5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis
Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check
3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher
C More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers
This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.
English.