Selected Areas in Cryptography - SAC 2015

Selected Areas in Cryptography - SAC 2015
Author: Orr Dunkelman
Publisher: Springer
Total Pages: 531
Release: 2016-03-17
Genre: Computers
ISBN: 3319313010

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

Selected Areas in Cryptography – SAC 2016

Selected Areas in Cryptography – SAC 2016
Author: Roberto Avanzi
Publisher: Springer
Total Pages: 582
Release: 2017-10-18
Genre: Computers
ISBN: 3319694537

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Selected Areas in Cryptography – SAC 2017

Selected Areas in Cryptography – SAC 2017
Author: Carlisle Adams
Publisher: Springer
Total Pages: 462
Release: 2018-01-12
Genre: Computers
ISBN: 3319725653

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms

Selected Areas in Cryptography

Selected Areas in Cryptography
Author: Orr Dunkelman
Publisher: Springer Nature
Total Pages: 727
Release: 2021-07-20
Genre: Computers
ISBN: 3030816524

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

Selected Areas in Cryptography – SAC 2018

Selected Areas in Cryptography – SAC 2018
Author: Carlos Cid
Publisher: Springer
Total Pages: 500
Release: 2019-01-12
Genre: Computers
ISBN: 3030109704

This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things

FPGA Algorithms and Applications for the Internet of Things

FPGA Algorithms and Applications for the Internet of Things
Author: Sharma, Preeti
Publisher: IGI Global
Total Pages: 257
Release: 2020-03-30
Genre: Computers
ISBN: 1522598081

In the research area of computer science, practitioners are constantly searching for faster platforms with pertinent results. With analytics that span environmental development to computer hardware emulation, problem-solving algorithms are in high demand. Field-Programmable Gate Array (FPGA) is a promising computing platform that can be significantly faster for some applications and can be applied to a variety of fields. FPGA Algorithms and Applications for the Internet of Things provides emerging research exploring the theoretical and practical aspects of computable algorithms and applications within robotics and electronics development. Featuring coverage on a broad range of topics such as neuroscience, bioinformatics, and artificial intelligence, this book is ideally designed for computer science specialists, researchers, professors, and students seeking current research on cognitive analytics and advanced computing.

Mathematical Modelling for Next-Generation Cryptography

Mathematical Modelling for Next-Generation Cryptography
Author: Tsuyoshi Takagi
Publisher: Springer
Total Pages: 363
Release: 2017-07-25
Genre: Computers
ISBN: 9811050651

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware
Author: Sujoy Sinha Roy
Publisher: Springer Nature
Total Pages: 109
Release: 2019-11-12
Genre: Technology & Engineering
ISBN: 9813299940

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.

Cryptographic Obfuscation

Cryptographic Obfuscation
Author: Máté Horváth
Publisher: Springer Nature
Total Pages: 107
Release: 2020-10-05
Genre: Computers
ISBN: 3319980416

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.