International 1

Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako,'s Advances in Cryptology - ASIACRYPT 2013: 19th International PDF

Posted On February 24, 2018 at 5:02 am by / Comments Off on Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako,'s Advances in Cryptology - ASIACRYPT 2013: 19th International PDF

By Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)

ISBN-10: 3642420443

ISBN-13: 9783642420443

ISBN-10: 3642420451

ISBN-13: 9783642420450

The two-volume set LNCS 8269 and 8270 constitutes the refereed complaints of the nineteenth foreign convention at the thought and alertness of Cryptology and data, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers offered have been rigorously chosen from 269 submissions. they're prepared in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography dependent upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Show description

Read Online or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II PDF

Similar international_1 books

Get Integrated Circuit and System Design. Power and Timing PDF

This e-book constitutes the completely refereed post-conference lawsuits of 18th foreign Workshop on energy and Timing Modeling, Optimization and Simulation, PATMOS 2008, that includes built-in Circuit and process layout, held in Lisbon, Portugal in the course of September 10-12, 2008. The 31 revised complete papers and 10 revised poster papers offered including three invited talks and four papers from a unique consultation on reconfigurable architectures have been conscientiously reviewed and chosen from a variety of submissions.

New PDF release: Informatics in Control, Automation and Robotics: 10th

The current ebook features a set of chosen papers from the 10th “International convention on Informatics up to the mark Automation and Robotics” (ICINCO 2013), held in Reykjavík, Iceland, from 29 to 31 July 2013. The convention used to be prepared in 4 simultaneous tracks: “Intelligent keep an eye on platforms and Optimization”, “Robotics and Automation”, “Signal Processing, Sensors, platforms Modeling and regulate” and “Industrial Engineering, creation and Management”.

Additional info for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

Example text

Thomas Peyrin and Lei Wang are supported by the Singapore National Research Foundation Fellowship 2012 (NRF-NRFF2012-06). References 1. : New Proofs for NMAC and HMAC: Security Without CollisionResistance. In: Dwork, C. ) CRYPTO 2006. LNCS, vol. 4117, pp. 602–619. Springer, Heidelberg (2006) 2. : Keying Hash Functions for Message Authentication. In: Koblitz, N. ) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996) 3. Brassard, G. ): CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990) 4.

Based on it, we apply a meet-in-the-middle attack to recover the value of Kin . After that, we apply two attacks. One is to recover the value of Kout , which results in a universal forgery attack on HMAC and a full-key recovery attack on NMAC. The attack of recovering Kout is similar with that of recovering Kin , except the procedure of finding target pairs. Instead of generating collisions as for recovering Kin , we will first recover the values of an intermediate chaining variable of the outer hash function, and then find a near collision on this intermediate chaining variable.

Therefore these techniques cannot be applied trivially in MAC setting. For CBC MAC and hash-based MAC, the main difference is how a message block is injected to an internal state. , the Miyaguchi-Preneel (MP) scheme Ex (m) ⊕ m ⊕ x. It affects the applicability of differential cryptanalysis. , randomize message block m to find a pair m and m that leads to a collision on the input to E detectable from the colliding MAC outputs, and derive Δx = m ⊕ m ). On the other hand, the internal state difference cannot be derived in the hash-based MAC setting except the collision case Δx = 0, which sets a constraint on the differentials of the underlying block cipher that can be exploited by an attacker.

Download PDF sample

Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II by Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)


by Edward
4.4

Rated 4.74 of 5 – based on 14 votes