Limit search to available items
Book Cover
E-book
Author CSCML (Symposium) (4th : 2020 : Beersheba, Israel)

Title Cyber security cryptography and machine learning : fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings / Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss (eds.)
Published Cham : Springer, 2020

Copies

Description 1 online resource
Series Lecture notes in computer science ; 12161
LNCS sublibrary: SL 4, Security and Cryptology
Lecture notes in computer science ; 12161.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 -- 1 Introduction -- 1.1 Related Work -- 1.2 Organization -- 2 Specification of SKINNY -- 3 Differential Distinguisher -- 3.1 Key Recovery Attack -- 4 A Biased Differential Distinguisher -- 4.1 Computing Biases of Differences in Nibbles -- 4.2 Experimental Verification -- 4.3 Decreasing the Time and Data Complexity -- 4.4 Key Recovery Attacks -- 5 Revisiting Impossible Differential Attacks on Single-Tweak SKINNY -- 5.1 Problems with the Attack of ch1DBLP:confspsafricacryptspsTolba0Y17
5.2 Fixing the Impossible Differential Attack -- 5.3 Improving the Fixed Impossible Differential Attack -- 6 Conclusion -- A Impossible Differential -- References -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- 1 Introduction -- 1.1 The Setting -- 1.2 Recap: ElGamal Cryptosystem -- 2 The System and the Protocol: ̀̀Highly Available (Recoverable) Distributed Key Generation'' (HADKEG) -- 2.1 The HADKEG Protocol -- 2.2 Phase 1: Generating Secret Shares -- 2.3 Phase 2: Proving Plaintext Equality -- 2.4 The Proofs
2.5 Phase 3: Combining Shares -- 3 Conclusion -- References -- Security Ranking of IoT Devices Using an AHP Model -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Features Sets -- 3.2 Analytic Hierarchy Process Technique -- 4 Model Implementation -- 4.1 Expert Analysis -- 4.2 Model Construction -- 5 Model Operation -- 5.1 Alternative Evaluation -- 5.2 Ranking IoT Devices -- 6 Summary and Future Work -- References -- Robust Malicious Domain Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Feature Engineering -- 3.3 Robust Feature Selection
4 Empirical Analysis and Evaluation -- 4.1 Experimental Design -- 4.2 Models and Parameters -- 5 Conclusion -- References -- NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis -- 1 Introduction -- 2 Preliminaries -- 2.1 GIFT-64-128 -- 2.2 Differential Cryptanalysis -- 2.3 SAT Problem -- 2.4 SAT Problems for GIFT-64-128 -- 2.5 NeuroSAT -- 3 NeuroGIFT -- 3.1 Motivations -- 3.2 Construction of Training Set -- 3.3 Three Versions of NeuroGIFT -- 3.4 Parameter Setting -- 4 Experimental Results -- 4.1 NeuroGift-V1 -- 4.2 NeuroGift-trunc -- 4.3 Generalisation to More Rounds
5 Conclusion -- A Clauses for the S-Box of GIFT -- B Impact of the Samples with Low Hamming Weight -- References -- Can the Operator of a Drone Be Located by Following the Drone's Path? -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 The Path of the Drone Gives Away Information on the Location of the Pilot -- 3.2 The Orientation of the Drone Is Not Needed -- 3.3 Recurrent Networks Are Not Better for the Task -- 3.4 The Effect of Measurement Disturbances, Measurement Accuracy and Sampling Rate -- 4 Related Work -- 5 Conclusions and Future Work -- References
Summary This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Beer-Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas
Notes International conference proceedings
Includes author index
Subject Data encryption (Computer science) -- Congresses
Internet -- Security measures -- Congresses
Machine learning -- Congresses
Network hardware.
Coding theory & cryptology.
Computer networking & communications.
Systems analysis & design.
Network security.
Computer security.
Computers -- Hardware -- Network Hardware.
Computers -- Security -- General.
Computers -- Online Services -- General.
Computers -- Information Technology.
Computers -- Networking -- Security.
Data encryption (Computer science)
Internet -- Security measures
Machine learning
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dolev, Shlomi.
Kolesnikov, Vladimir (Computer scientist)
Lodha, Sachin.
Weiss, Gera
ISBN 9783030497859
3030497852
Other Titles CSCML 2020