Proceedings of the 2016 ACM Workshop on Theory of Implementation Security

Proceedings of the 2016 ACM Workshop on Theory of Implementation Security PDF

Author: Begül Bilgin

Publisher:

Published: 2016-10-24

Total Pages:

ISBN-13: 9781450345750

DOWNLOAD EBOOK →

CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security Oct 24, 2016-Oct 28, 2016 Vienna, Austria. You can view more information about this proceeding and all of ACM�s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory PDF

Author: Claude Carlet

Publisher: Cambridge University Press

Published: 2021-01-07

Total Pages: 577

ISBN-13: 1108634664

DOWNLOAD EBOOK →

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design PDF

Author: Shivam Bhasin

Publisher: Springer Nature

Published: 2021-10-26

Total Pages: 338

ISBN-13: 3030899152

DOWNLOAD EBOOK →

This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021. The 14 full papers carefully reviewed and selected from 31 submissions are presented in this volume together with the 4 extended keynote abstracts. The workshop covers the following subjects: cryptography, side-channel analysis, cryptographic implementations, fault attacks, implementation attacks, post-quantum cryptography, hardware accelerators, etc.

Proceedings of the Fourth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’19)

Proceedings of the Fourth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’19) PDF

Author: Sergey Kovalev

Publisher: Springer Nature

Published: 2020-06-22

Total Pages: 713

ISBN-13: 3030500977

DOWNLOAD EBOOK →

This book gathers papers presented in the main track of IITI 2019, the Fourth International Scientific Conference on Intelligent Information Technologies for Industry, held in Ostrava–Prague, Czech Republic on December 2–7, 2019. The conference was jointly organized by Rostov State Transport University (Russia) and VŠB – Technical University of Ostrava (Czech Republic) with the participation of the Russian Association for Artificial Intelligence (RAAI). IITI 2019 was devoted to practical models and industrial applications of intelligent information systems. Though chiefly intended to promote the implementation of advanced information technologies in various industries, topics such as the state of the art in intelligent systems and soft computing were also discussed.

Cryptographic Hardware and Embedded Systems – CHES 2017

Cryptographic Hardware and Embedded Systems – CHES 2017 PDF

Author: Wieland Fischer

Publisher: Springer

Published: 2017-09-18

Total Pages: 710

ISBN-13: 3319667874

DOWNLOAD EBOOK →

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

Selected Areas in Cryptography

Selected Areas in Cryptography PDF

Author: Orr Dunkelman

Publisher: Springer Nature

Published: 2021-07-20

Total Pages: 727

ISBN-13: 3030816524

DOWNLOAD EBOOK →

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

Progress in Cryptology – INDOCRYPT 2021

Progress in Cryptology – INDOCRYPT 2021 PDF

Author: Avishek Adhikari

Publisher: Springer Nature

Published: 2021-12-08

Total Pages: 639

ISBN-13: 3030925188

DOWNLOAD EBOOK →

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.