Boura C. Symmetric Cryptography 2. Cryptanalysis and Future Directions 2023

Download Download Torrent Opens in your torrent client (e.g. qBittorrent)
Category Other
Size2.86 MB
Added1 year ago (2025-03-10 23:38:47)
Health
Fair2/1
Info Hash6AA949099297AF61FE02234C89FAEC46BA1AE27E
Peers Updated16 hours ago (2026-03-24 13:09:58)

Report Torrent

0 / 300

Description


Textbook in PDF format

Symmetric-key cryptology is one of the two main branches of modern cryptology.
It comprises all primitives, modes and constructions used to ensure the confidentiality, authenticity and integrity of communications by means of a single key shared between the two communicating parties. Hash functions and some other keyless constructions are equally considered as symmetric constructions because of the similarity in the design and analysis with classical keyed symmetric ciphers. Symmetric algorithms are essential for establishing secure communications, as they can have very compact implementations and achieve high speed in both software and hardware. Furthermore, compared to public-key algorithms, keys used in symmetric cryptography are short, typically of 128 or 256 bits only.
The goal of this two-volume project is to provide a thorough overview of the most important design, cryptanalysis and proof techniques for symmetric designs. The first volume is dedicated to the most popular design trends for symmetric primitives, modes and constructions, and to the presentation of the most important proof techniques. On the other hand, the current volume describes and analyzes some of the most well-established and powerful cryptanalysis techniques against symmetric constructions
Preface
Part 1. Cryptanalysis of Symmetric-key Algorithms
Differential Cryptanalysis
Linear Cryptanalysis
Impossible Differential Cryptanalysis
Zero-Correlation Cryptanalysis
Differential-Linear Cryptanalysis
Boomerang Cryptanalysis
Meet-in-the-Middle Cryptanalysis
Meet-in-the-Middle Demirci-Selçuk Cryptanalysis
Invariant Cryptanalysis
Higher Order Differentials, Integral Attacksand Variants
Cube Attacks and Distinguishers
Correlation Attacks on Stream Ciphers
Addition, Rotation, XOR
SHA-3 Contest Related Cryptanalysis
Cryptanalysis of SHA-1
Part 2. Future Directions
Lightweight Cryptography
Post-Quantum Symmetric Cryptography
New Fields in Symmetric Cryptography
Deck-function-based Cryptography

×