Description |
1 online resource (viii, 207 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 9540 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 9540. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions |
|
5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis |
|
Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check |
|
3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher |
|
C More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers |
Summary |
This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption |
Notes |
Includes author index |
|
English |
|
Online resource; title from PDF title page (SpringerLink, viewed April 6, 2016) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer security.
|
|
Coding theory & cryptology.
|
|
Computers -- Security -- General.
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Pasalic, Enes, editor.
|
|
Knudsen, Lars, 1962- editor.
|
ISBN |
9783319291727 |
|
3319291726 |
|