Selected Areas in Cryptography - SAC 2025, Kartoniert / Broschiert
Selected Areas in Cryptography - SAC 2025
- 32nd International Conference, Toronto, ON, Canada, August 13-15, 2025, Revised Selected Papers
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Christina Boura, Atefeh Mashatan, Ali Miri
- Verlag:
- Springer, 01/2026
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032105356
- Artikelnummer:
- 12477785
- Umfang:
- 828 Seiten
- Gewicht:
- 1229 g
- Maße:
- 235 x 155 mm
- Stärke:
- 45 mm
- Erscheinungstermin:
- 3.1.2026
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Klappentext
¿Cryptanalysis of Lightweight Ciphers.- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.- Improving the Rectangle Attack on GIFT-64.- Side-Channel Attacks and Countermeasures.- Mask Compression: High-Order Masking on Memory-Constrained Devices.- Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme.- Threshold Implementations with Non-Uniform Inputs.- Post-Quantum Constructions.- SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits.- A Post-Quantum Round-Optimal Oblivious PRF from Isogenies.- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.-Symmetric cryptography and fault attacks.- The Random Fault Model.- Probabilistic Related-Key Statistical Saturation Cryptanalysis.- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.- Post-Quantum Analysis and Implementations.- Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks.- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery.- Fast and Efficient Hardware Implementation of HQC.- Homomorphic encryption.- On the Precision Loss in Approximate Homomorphic Encryption.- Secure Function Extensions to Additively Homomorphic Cryptosystems.- Public-Key Cryptography.- Generalized Implicit Factorization Problem.- Differential Cryptanalysis.- CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives.- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.