Progress in Cryptology -- INDOCRYPT 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols and Lattice-based Cryptography.

Author(s): Willi Meier, Debdeep Mukhopadhyay (eds.)
Series: Lecture Notes in Computer Science 8885 Security and Cryptology
Edition: 1
Publisher: Springer International Publishing
Year: 2014

Language: English
Pages: 444
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science

Front Matter....Pages I-XXV
Front Matter....Pages 1-1
Side-Channel Analysis on Blinded Regular Scalar Multiplications....Pages 3-20
Online Template Attacks....Pages 21-36
Improved Multi-Bit Differential Fault Analysis of Trivium....Pages 37-52
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis....Pages 53-67
Front Matter....Pages 69-69
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption....Pages 71-88
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions....Pages 89-103
Front Matter....Pages 105-105
Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers....Pages 107-123
On the Key Schedule of Lightweight Block Ciphers....Pages 124-142
Cryptanalysis of Reduced-Round SIMON32 and SIMON48....Pages 143-160
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256....Pages 161-176
Front Matter....Pages 177-177
Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013....Pages 179-196
EscApe : Diagonal Fault Analysis of APE....Pages 197-216
Front Matter....Pages 217-217
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions....Pages 219-236
Linear Cryptanalysis of FASER128/256 and TriviA-ck....Pages 237-254
Partial Key Exposure Attack on CRT-RSA....Pages 255-264
On the Leakage of Information in Biometric Authentication....Pages 265-280
Front Matter....Pages 281-281
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization....Pages 283-303
A Very Compact FPGA Implementation of LED and PHOTON....Pages 304-321
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?....Pages 322-337
Front Matter....Pages 339-339
Wire-Tap Codes as Side-Channel Countermeasure....Pages 341-359
Front Matter....Pages 339-339
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes....Pages 360-373
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes....Pages 374-390
Front Matter....Pages 391-391
Binary Edwards Curves Revisited....Pages 393-408
Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two....Pages 409-427
A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves....Pages 428-442
Back Matter....Pages 443-444