16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
391 stránek
14 hodin čtení
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.
This work covers a wide range of topics in cryptography, including hash function cryptanalysis and design, with a focus on producing collisions for Panama and analyzing FORK-256. It delves into stream cipher cryptanalysis, examining attacks on ciphers like VEST and Achterbahn-128/80, and discusses differential-linear attacks against Phelix. The text also explores methods to enrich message spaces in ciphers and analyzes the security of constructions that combine FIL random oracles. It highlights both effective and ineffective post-processing techniques for biased physical random numbers and presents fast talks on block cipher cryptanalysis and design. The 128-bit block cipher CLEFIA is introduced, along with new lightweight DES variants and various block cipher attacks, including a novel attack on 6-round IDEA and related-key rectangle attacks on reduced AES-192 and AES-256. Further discussions include the security of IV-dependent stream ciphers, general attacks on Pomaranch-like keystream generators, and a thorough analysis of QUAD. The work also addresses hash function cryptanalysis, particularly message freedom in MD4 and MD5 collisions, and presents algebraic cryptanalysis of 58-round SHA-1. Additionally, it covers side channel attacks, time-driven cache attack models, and improvements in MAC security through randomized message preprocessing, concluding with new bounds for PMAC, TMAC, and XCBC, and the concept of perfect bl