Limit search to available items
Book Cover
E-book
Author BalkanCryptSec (Conference) (2nd : 2015 : Koper, Slovenia)

Title Cryptography and information security in the Balkans : second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers / Enes Pasalic, Lars R. Knudsen (eds.)
Published Switzerland : Springer, 2016

Copies

Description 1 online resource (viii, 207 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 9540
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9540. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions
5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis
Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check
3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher
C More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers
Summary This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption
Notes Includes author index
English
Online resource; title from PDF title page (SpringerLink, viewed April 6, 2016)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security.
Coding theory & cryptology.
Computers -- Security -- General.
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Form Electronic book
Author Pasalic, Enes, editor.
Knudsen, Lars, 1962- editor.
ISBN 9783319291727
3319291726
Other Titles BalkanCryptSec 2015