Download Advances in Cryptology - ASIACRYPT 2013: 19th International by Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, PDF

By Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)

The two-volume set LNCS 8269 and 8270 constitutes the refereed lawsuits of the nineteenth foreign convention at the conception and alertness of Cryptology and data, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers awarded have been rigorously chosen from 269 submissions. they're equipped in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography established upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Show description

Read Online or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II PDF

Best international_1 books

Principles of Distributed Systems: 17th International Conference, OPODIS 2013, Nice, France, December 16-18, 2013. Proceedings

This booklet constitutes the refereed court cases of the seventeenth overseas convention on ideas of disbursed structures, OPODIS 2013, held in great, France, in December 2013. the nineteen papers provided including invited talks have been rigorously reviewed and chosen from forty-one submissions. The convention is a global discussion board for the trade of state of the art wisdom on dispensed computing and platforms.

Recent Advances in Constraints: 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers

This publication constitutes the completely refereed and prolonged post-workshop court cases of the twelfth Annual ERCIM foreign Workshop on Constraint fixing and Constraint common sense Programming, CSCLP 2007, held in Rocquencourt, France, in June 2007. the ten revised complete papers offered have been rigorously reviewed and chosen from sixteen preliminary submissions.

Power Transmissions: Proceedings of the International Conference on Power Transmissions 2016

This ebook offers papers from the overseas convention on energy Transmissions 2016, held in Chongqing, China, 27th-30th October 2016. the most aim of this convention is to supply a discussion board for the newest advances, addressing the demanding situations in sleek mechanical transmissions. The convention complaints handle all elements of drugs and gear transmission know-how and a variety of functions.

Proceedings of COOP 2010: Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010, Aix-en-Provence

COOP’10 is the ninth version of the foreign convention on Designing Cooperative platforms, being the second one ecu convention within the box of machine Supported Cooperative paintings. The convention brings jointly researchers who give a contribution to the research and layout of cooperative platforms and their integration in organizational neighborhood, public and different settings, and their implications for coverage and decision-making.

Additional info for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

Example text

Thus we are able to get the output value of EKout ⊕ Kout : T ⊕ T . For a pair of outputs of EKout ⊕ Kout that has a difference satisfying the constraint on the output difference of EKin in Fig. 1 can be applied to recover Kout in a straight-forward way. This section mainly describes the procedure of finding such a pair. Moreover, we provide a time-memory-data tradeoff for recovering Kout . It is interesting to point out the difference for finding a target pair of recovering Kin and that of recovering Kout .

Next, we try to minimize each of time, data, and memory complexities. If we minimize the time complexity, we should choose (r, m, n, t) = (1, 6, 5, 0), which results in (data, time, memory)= (2448 , 2384 , 2360 ). If we minimize the data complexity, we should choose (r, m, n, t) = (4, 7, 5, t) which results in (data, time, memory)= (2257 , 2480+t , 2448−t ). If we minimize the memory complexity, we should choose (r, m, n, t) = (1, 6, 5, 144) which results in (data, time, memory)= (2449 , 2504 , 2240 ).

A series of analysis results have been published on these AES-like block ciphers (or unkeyed permutations) under the CBC MAC setting. Refer to [12,13,32,4,9]. , [32,9] use the impossible differential attack. The second approach is based on a hash function. Such designs with an AES-like hash function include HMACWhirlpool and HMAC-Grøstl. Surprisingly, there is NO algorithmic analysis result yet on these AES-like hash functions in the MAC setting to our best knowledge, though a side-channel attack was published on HMAC-Whirlpool [33].

Download PDF sample

Rated 4.56 of 5 – based on 39 votes