ebook img

Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers PDF

209 Pages·2016·4.288 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers

Enes Pasalic Lars R. Knudsen (Eds.) Cryptography and 0 Information Security 4 5 9 S in the Balkans C N L Second International Conference, BalkanCryptSec 2015 Koper, Slovenia, September 3–4, 2015 Revised Selected Papers 123 Lecture Notes in Computer Science 9540 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Enes Pasalic Lars R. Knudsen (Eds.) (cid:129) Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015 – Koper, Slovenia, September 3 4, 2015 Revised Selected Papers 123 Editors EnesPasalic LarsR. Knudsen University of Primorska Technical University of Denmark Koper Kongens Lyngby Slovenia Denmark ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-29171-0 ISBN978-3-319-29172-7 (eBook) DOI 10.1007/978-3-319-29172-7 LibraryofCongressControlNumber:2015960215 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerInternationalPublishingSwitzerland2016 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAGSwitzerland Preface This volume contains the papers presented at BalkanCryptSec 2015, the Second International Conference on Cryptography and Information Security in the Balkans, held September 3–4, 2015, in Koper, Slovenia. The call for papers was answered by 27 submissions from 15 countries. Each submission was reviewed by at least three Program Committee members. After the conference a second round of reviews was held for therevised papers. The committee decided to select 12 papers for the proceedings. TheProgramCommitteeconsistedof28membersrepresenting18countries.These members were carefully selected to represent academia and industry, as well as to include world-class experts in various research fields of interest to BalkanCryptSec. Additionally,theworkshopincludedthreeexcellentinvitedtalksandatutorialtalk. Kaisa Nyberg from Aalto University, Finland, talked about multidimensional linear attacks in a presentation entitled “Key-Variance in Statistical Cryptanalysis.” Alexander Pott from Otto-von-Guericke University of Magdeburg discussed his researchinatalkentitled“AlmostPerfectNonlinearandPlanarFunctions:ASurveyof (not so) Recent Results and Open Problems.” Billy Bob Brumley from Tampere University of Technology presented results, techniques, and the evolution of certain attack methods in “Software-Based Side-Channel Attacks.” Enes Pasalic also held a tutorial talk titled “Constructing Boolean Functions for Stream Ciphers.” We would like to thank everyone who made the conference possible. First and foremost the authors who submitted their papers, in particular the authors of the accepted papers, and the invited speakers. The hard task of reading, commenting, debating, and finally selecting the papers for the conference fell on the Program Committeemembers.TheProgramCommitteealsousedtwoexternalreviewers,whom we wish to thank as well. We would also like to thank the local Organizing Committee and especially Nastja Cepak, a PhD student in cryptography at University of Primorska, for her enormous help in arranging and taking care of most of the tasks related to this conference. This was the second annual BalkanCryptSec conference. The first one was held in 2014 thanks to Svetla Nikova and Tsonka Baicheva’s idea of hosting a cryptography and security conference in the Balkans. We hope and believe the conference will continue for many years to come. November 2015 Enes Pasalic Lars R. Knudsen Organization Program Chairs Enes Pasalic University of Primorska, Slovenia Lars Knudsen Technical University of Denmark, Denmark Steering Committee Sedat Akleylek Ondokuz Mayis University, Turkey Tsonka Baicheva Bulgarian Academy of Sciences, Sofia Lejla Batina Radboud University Nijmegen, The Netherlands Vesna Dimitrova Ss. Cyril and Methodius University, Macedonia Zoran Ðurić University of Banja Luka, Bosnia and Herzegovina Bogdan Groza Politehnica University of Timisoara, Romania Sokratis Katsikas University of Piraeus, Greece Miodrag Mihaljević Serbian Academy of Sciences, Serbia Svetla Nikova KU Leuven, Belgium Berna Ors Istanbul Technical University, Turkey Panagiotis Rizomiliotis University of the Aegean, Greece Ferucio Laurentiu Tiplea Alexandru Ioan Cuza University, Romania Tolga Yalcin UIST St. Paul the Apostle, Macedonia Organizing Committee Enes Pasalic, Klavdija Kutnar, Štefko Miklavič, Nastja Cepak PC Members Enes Pasalic Sedat Akleylek Marko Holbl Sokratis Katsikas Kaisa Nyberg Paolo D’Arco Billy Bob Brumley Vesselin Velichkov Sugata Gangopadhyay Michael Scott Alexander Pott Claude Carlet Panagiotis Rizomiliotis Dieter Gollmann Miodrag Mihaljevic Ricardo Dahab Ferucio Laurentiu Tiplea Frederik Vercauteren Tsonka Baicheva Pante Stănică Bogdan Groza Contents Symmetric Key Cryptography Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed–Muller Codes. . . . . . . . . . . . . . . . . 3 Konstantinos Limniotis and Nicholas Kolokotronis Results on Characterizations of Plateaued Functions in Arbitrary Characteristic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Sihem Mesnager, Ferruh Özbudak, and Ahmet Sınak Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Georgi Ivanov, Nikolay Nikolov, and Svetla Nikova Cryptanalysis Analysis of the Authenticated Cipher MORUS (v1). . . . . . . . . . . . . . . . . . . 45 Aleksandra Mileva, Vesna Dimitrova, and Vesselin Velichkov Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Yuri Borissov, Peter Boyvalenkov, and Robert Tsenkov Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Maciej Skórski Security and Protocols Synchronous Universally Composable Computer Networks . . . . . . . . . . . . . 95 Dirk Achenbach, Jörn Müller-Quade, and Jochen Rill Key-Policy Attribute-Based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps . . . . . . . . . . . . . . . . . . . . . . . . 112 Constantin Cătălin Drăgan and Ferucio Laurenţiu Ţiplea Closing the Gap: A Universal Privacy Framework for Outsourced Data. . . . . 134 Dirk Achenbach, Matthias Huber, Jörn Müller-Quade, and Jochen Rill VIII Contents Implementation and Verifiable Encryption On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Sedat Akleylek, Özgur Dağdelen, and Zaliha Yüce Tok cuHE: A Homomorphic Encryption Accelerator Library. . . . . . . . . . . . . . . . 169 Wei Dai and Berk Sunar Extended Functionality in Verifiable Searchable Encryption. . . . . . . . . . . . . 187 James Alderman, Christian Janson, Keith M. Martin, and Sarah Louise Renwick Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Symmetric Key Cryptography

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.