Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako,'s Advances in Cryptology - ASIACRYPT 2013: 19th International PDF
By Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)
The two-volume set LNCS 8269 and 8270 constitutes the refereed complaints of the nineteenth foreign convention at the thought and alertness of Cryptology and data, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers offered have been rigorously chosen from 269 submissions. they're prepared in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography dependent upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Read Online or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II PDF
Similar international_1 books
This e-book constitutes the completely refereed post-conference lawsuits of 18th foreign Workshop on energy and Timing Modeling, Optimization and Simulation, PATMOS 2008, that includes built-in Circuit and process layout, held in Lisbon, Portugal in the course of September 10-12, 2008. The 31 revised complete papers and 10 revised poster papers offered including three invited talks and four papers from a unique consultation on reconfigurable architectures have been conscientiously reviewed and chosen from a variety of submissions.
The current ebook features a set of chosen papers from the 10th “International convention on Informatics up to the mark Automation and Robotics” (ICINCO 2013), held in Reykjavík, Iceland, from 29 to 31 July 2013. The convention used to be prepared in 4 simultaneous tracks: “Intelligent keep an eye on platforms and Optimization”, “Robotics and Automation”, “Signal Processing, Sensors, platforms Modeling and regulate” and “Industrial Engineering, creation and Management”.
- Solar Radio Emission During the International Geophysical Year
- Actes du Congrès international des mathématiciens: 1 10 Septembre 1970 NICE France
- Experimental Robotics: The 10th International Symposium on Experimental Robotics
- Combinatorial Optimization and Applications: 10th International Conference, COCOA 2016, Hong Kong, China, December 16–18, 2016, Proceedings
- Telematics - Support for Transport: 14th International Conference on Transport Systems Telematics, TST 2014, Katowice/Kraków/Ustroń, Poland, October 22-25, 2014. Selected Papers
- Proceedings of International Conference on Computer Vision and Image Processing: CVIP 2016, Volume 2
Additional info for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Thomas Peyrin and Lei Wang are supported by the Singapore National Research Foundation Fellowship 2012 (NRF-NRFF2012-06). References 1. : New Proofs for NMAC and HMAC: Security Without CollisionResistance. In: Dwork, C. ) CRYPTO 2006. LNCS, vol. 4117, pp. 602–619. Springer, Heidelberg (2006) 2. : Keying Hash Functions for Message Authentication. In: Koblitz, N. ) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996) 3. Brassard, G. ): CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990) 4.
Based on it, we apply a meet-in-the-middle attack to recover the value of Kin . After that, we apply two attacks. One is to recover the value of Kout , which results in a universal forgery attack on HMAC and a full-key recovery attack on NMAC. The attack of recovering Kout is similar with that of recovering Kin , except the procedure of ﬁnding target pairs. Instead of generating collisions as for recovering Kin , we will ﬁrst recover the values of an intermediate chaining variable of the outer hash function, and then ﬁnd a near collision on this intermediate chaining variable.
Therefore these techniques cannot be applied trivially in MAC setting. For CBC MAC and hash-based MAC, the main diﬀerence is how a message block is injected to an internal state. , the Miyaguchi-Preneel (MP) scheme Ex (m) ⊕ m ⊕ x. It aﬀects the applicability of diﬀerential cryptanalysis. , randomize message block m to ﬁnd a pair m and m that leads to a collision on the input to E detectable from the colliding MAC outputs, and derive Δx = m ⊕ m ). On the other hand, the internal state diﬀerence cannot be derived in the hash-based MAC setting except the collision case Δx = 0, which sets a constraint on the diﬀerentials of the underlying block cipher that can be exploited by an attacker.
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II by Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)