Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4356

ISBN: 3540744614, 9783540744610

Size: 4 MB (3893808 bytes)

Pages: 395/404

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Eyüp Serdar Ayaz, Ali Aydın Selçuk (auth.), Eli Biham, Amr M. Youssef (eds.)3540744614, 9783540744610

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006.

The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.


Table of contents :
Front Matter….Pages –
Improved DST Cryptanalysis of IDEA….Pages 1-14
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192….Pages 15-27
Related-Key Rectangle Attack on the Full SHACAL-1….Pages 28-44
Cryptanalysis of Achterbahn-Version 2….Pages 45-55
Cryptanalysis of the Stream Cipher ABC v2….Pages 56-66
The Design of a Stream Cipher LEX….Pages 67-75
Dial C for Cipher….Pages 76-95
Improved Security Analysis of XEX and LRW Modes….Pages 96-113
Extended Hidden Number Problem and Its Cryptanalytic Applications….Pages 114-133
Changing the Odds Against Masked Logic….Pages 134-146
Advances on Access-Driven Cache Attacks on AES….Pages 147-162
Blind Differential Cryptanalysis for Enhanced Power Attacks….Pages 163-173
Efficient Implementations of Multivariate Quadratic Systems….Pages 174-187
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication….Pages 188-202
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems….Pages 203-219
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2….Pages 220-233
Multi-pass Fast Correlation Attack on Stream Ciphers….Pages 234-248
Crossword Puzzle Attack on NLS….Pages 249-265
When Stream Cipher Analysis Meets Public-Key Cryptography….Pages 266-284
On Redundant τ -Adic Expansions and Non-adjacent Digit Sets….Pages 285-301
Pairing Calculation on Supersingular Genus 2 Curves….Pages 302-316
Efficient Divisor Class Halving on Genus Two Curves….Pages 317-326
Message Authentication on 64-Bit Architectures….Pages 327-341
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme….Pages 342-357
Constructing an Ideal Hash Function from Weak Ideal Compression Functions….Pages 358-375
Provably Good Codes for Hash Function Design….Pages 376-393
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers”
Shopping Cart
Scroll to Top