000 06793cam a2200793 i 4500
001 ocn946027947
003 OCoLC
005 20250703164653.0
006 m o d
007 cr cnu|||unuuu
008 160406s2016 sz a o 101 0 eng d
040 _aGW5XE
_beng
_erda
_epn
_cGW5XE
_dOCLCO
_dOCLCF
_dOCLCO
_dKSU
_dDGU
_dIAD
_dJBG
_dICW
_dZ5A
_dILO
_dICN
_dESU
_dIOG
_dU3W
_dOCLCA
_dBUF
_dJG0
_dTFW
_dEBLCP
_dWYU
_dUKMGB
_dUX1
_dOCLCQ
_dAJS
_dSFB
_dNLW
_dOCLCO
_dUKAHL
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
015 _aGBB8N3492
_2bnb
016 7 _a019148728
_2Uk
019 _a1229054075
020 _a9783319291727
_q(electronic bk.)
020 _a3319291726
_q(electronic bk.)
020 _z9783319291710
024 7 _a10.1007/978-3-319-29172-7
_2doi
029 1 _aAU@
_b000057668801
029 1 _aDKDLA
_b820120-katalog:999914504305765
029 1 _aUKMGB
_b019148728
035 _a(OCoLC)946027947
_z(OCoLC)1229054075
037 _acom.springer.onix.9783319291727
_bSpringer Nature
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8/2
_223
049 _aMAIN
111 2 _aBalkanCryptSec (Conference)
_n(2nd :
_d2015 :
_cKoper, Slovenia)
_956771
245 1 0 _aCryptography and information security in the Balkans :
_bsecond International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers /
_cEnes Pasalic, Lars R. Knudsen (eds.).
246 3 _aBalkanCryptSec 2015
264 1 _aSwitzerland :
_bSpringer,
_c2016.
300 _a1 online resource (viii, 207 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v9540
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
500 _aIncludes author index.
588 0 _aOnline resource; title from PDF title page (SpringerLink, viewed April 6, 2016).
505 0 _aIntro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions
505 8 _a5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis
505 8 _aAnalysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check
505 8 _a3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher
505 8 _aC More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers
520 _aThis book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.
546 _aEnglish.
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 0 _aComputer security
_vCongresses.
_914968
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 6 _aSécurité informatique
_vCongrès.
_917411
650 7 _aComputer security.
_2bicssc
_92191
650 7 _aCoding theory & cryptology.
_2bicssc
_953461
650 7 _aComputers
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_2fast
_92191
650 7 _aData encryption (Computer science)
_2fast
_913647
655 7 _aConference papers and proceedings
_2fast
_96065
700 1 _aPasalic, Enes,
_eeditor.
_956773
700 1 _aKnudsen, Lars,
_d1962-
_eeditor.
_1https://id.oclc.org/worldcat/entity/E39PBJxxcWtm8pvQvKvCWfBdcP
_947414
758 _ihas work:
_aCryptography and information security in the Balkans (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGVJXDXXttfKVYcv3Mxtw3
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 _z3319291718
830 0 _aLecture notes in computer science ;
_v9540.
_x0302-9743
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-319-29172-7
938 _aAskews and Holts Library Services
_bASKH
_nAH31357712
938 _aProQuest Ebook Central
_bEBLB
_nEBL5588200
994 _a92
_bATIST
999 _c644582
_d644582