Cryptography and information security in the Balkans : second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers /: second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers. (2016)
- Record Type:
- Book
- Title:
- Cryptography and information security in the Balkans : second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers /: second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers. (2016)
- Main Title:
- Cryptography and information security in the Balkans : second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers
- Other Titles:
- BalkanCryptSec 2015
- Further Information:
- Note: Enes Pasalic, Lars R. Knudsen (eds.).
- Editors:
- Pasalic, Enes
Knudsen, Lars, 1962- - Other Names:
- BalkanCryptSec (Conference), 2nd
- Contents:
- Intro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2, n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions 5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect.6; References; LinearIntro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2, n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions 5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect.6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check 3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher C More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (viii, 207 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computers -- Security -- General
Computer security
Data encryption (Computer science)
Computer security
Coding theory & cryptology
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319291727
3319291726 - Related ISBNs:
- 9783319291710
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed April 6, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.362950
- Ingest File:
- 01_330.xml