Atjaunināt sīkdatņu piekrišanu

Selected Areas in Cryptography SAC 2024: 31st International Conference, Montreal, QC, Canada, August 2830, 2024, Revised Selected Papers, Part II [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 318 pages, height x width: 235x155 mm, 26 Illustrations, color; 25 Illustrations, black and white; XII, 318 p. 51 illus., 26 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15517
  • Izdošanas datums: 13-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031828402
  • ISBN-13: 9783031828409
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,99 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 318 pages, height x width: 235x155 mm, 26 Illustrations, color; 25 Illustrations, black and white; XII, 318 p. 51 illus., 26 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15517
  • Izdošanas datums: 13-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031828402
  • ISBN-13: 9783031828409
Citas grāmatas par šo tēmu:
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.





The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections:





Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption.





Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.
.- Authenticated Encryption.
.- Generic Security of the Ascon Mode: On the Power of Key Blinding.
.- Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency
(Decryption-Fast) SIV.
.- Provably Secure Online Authenticated Encryption and Bidirectional Online
Channels.
.- Symmetric Design Strategies.
.- Classical and Quantum Generic Attacks on 6-round Feistel Schemes.
.- Weightwise (almost) perfectly balanced functions based on total orders.
.- Generalized Triangular Dynamical System: An Algebraic System for
Constructing Cryptographic Permutations over Finite Fields.
.- Cryptanalysis of Arithmetization-Oriented Primitives.
.- A Univariate Attack against the Limited-Data Instance of Ciminion.
.- Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data
Complexity.
.- Symmetric Primitive Design.
.- Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Application to PASTA.
.- Koala: A Low-Latency Pseudorandom Function.
.- Implementations and Side-Channel Analysis.
.- Modular Multiplication in the AMNS Representation:
Hardware Implementation.
.- Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in
Deep Learning-based Side-Channel Analysis.