Details for this torrent 

Boura C. Symmetric Cryptography 2. Cryptanalysis and Future Directions 2023
Type:
Other > E-books
Files:
1
Size:
2.86 MiB (2996590 Bytes)
Uploaded:
2023-12-13 11:41 GMT
By:
andryold1
Seeders:
38
Leechers:
8

Info Hash:
6AA949099297AF61FE02234C89FAEC46BA1AE27E




Textbook in PDF format

Symmetric-key cryptology is one of the two main branches of modern cryptology.
It comprises all primitives, modes and constructions used to ensure the confidentiality, authenticity and integrity of communications by means of a single key shared between the two communicating parties. Hash functions and some other keyless constructions are equally considered as symmetric constructions because of the similarity in the design and analysis with classical keyed symmetric ciphers. Symmetric algorithms are essential for establishing secure communications, as they can have very compact implementations and achieve high speed in both software and hardware. Furthermore, compared to public-key algorithms, keys used in symmetric cryptography are short, typically of 128 or 256 bits only.
The goal of this two-volume project is to provide a thorough overview of the most important design, cryptanalysis and proof techniques for symmetric designs. The first volume is dedicated to the most popular design trends for symmetric primitives, modes and constructions, and to the presentation of the most important proof techniques. On the other hand, the current volume describes and analyzes some of the most well-established and powerful cryptanalysis techniques against symmetric constructions
Preface
Part 1. Cryptanalysis of Symmetric-key Algorithms
Differential Cryptanalysis
Linear Cryptanalysis
Impossible Differential Cryptanalysis
Zero-Correlation Cryptanalysis
Differential-Linear Cryptanalysis
Boomerang Cryptanalysis
Meet-in-the-Middle Cryptanalysis
Meet-in-the-Middle Demirci-Selçuk Cryptanalysis
Invariant Cryptanalysis
Higher Order Differentials, Integral Attacksand Variants
Cube Attacks and Distinguishers
Correlation Attacks on Stream Ciphers
Addition, Rotation, XOR
SHA-3 Contest Related Cryptanalysis
Cryptanalysis of SHA-1
Part 2. Future Directions
Lightweight Cryptography
Post-Quantum Symmetric Cryptography
New Fields in Symmetric Cryptography
Deck-function-based Cryptography