Search results: Found 3

Listing 1 - 3 of 3
Sort by
International Symposium on Mathematics, Quantum Theory, and Cryptography

Authors: --- --- --- --- et al.
Book Series: Mathematics for Industry ISBN: 9789811551918 Year: Pages: 274 DOI: 10.1007/978-981-15-5191-8 Language: English
Publisher: Springer Nature
Subject: Agriculture (General) --- Computer Science
Added to DOAB on : 2020-11-19 00:18:33
License:

Loading...
Export citation

Choose an application

Abstract

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Interactions between Group Theory, Symmetry and Cryptology

Author:
ISBN: 9783039288021 / 9783039288038 Year: Pages: 164 DOI: 10.3390/books978-3-03928-803-8 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Science (General) --- Mathematics
Added to DOAB on : 2020-06-09 16:38:57
License:

Loading...
Export citation

Choose an application

Abstract

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.

Side Channel Attacks

Author:
ISBN: 9783039210008 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Listing 1 - 3 of 3
Sort by
Narrow your search