Eyüp Serdar Ayaz, Ali Aydın Selçuk (auth.), Eli Biham, Amr M. Youssef (eds.)3540744614, 9783540744610
The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.
Table of contents :
Front Matter….Pages –
Improved DST Cryptanalysis of IDEA….Pages 1-14
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192….Pages 15-27
Related-Key Rectangle Attack on the Full SHACAL-1….Pages 28-44
Cryptanalysis of Achterbahn-Version 2….Pages 45-55
Cryptanalysis of the Stream Cipher ABC v2….Pages 56-66
The Design of a Stream Cipher LEX….Pages 67-75
Dial C for Cipher….Pages 76-95
Improved Security Analysis of XEX and LRW Modes….Pages 96-113
Extended Hidden Number Problem and Its Cryptanalytic Applications….Pages 114-133
Changing the Odds Against Masked Logic….Pages 134-146
Advances on Access-Driven Cache Attacks on AES….Pages 147-162
Blind Differential Cryptanalysis for Enhanced Power Attacks….Pages 163-173
Efficient Implementations of Multivariate Quadratic Systems….Pages 174-187
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication….Pages 188-202
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems….Pages 203-219
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2….Pages 220-233
Multi-pass Fast Correlation Attack on Stream Ciphers….Pages 234-248
Crossword Puzzle Attack on NLS….Pages 249-265
When Stream Cipher Analysis Meets Public-Key Cryptography….Pages 266-284
On Redundant τ -Adic Expansions and Non-adjacent Digit Sets….Pages 285-301
Pairing Calculation on Supersingular Genus 2 Curves….Pages 302-316
Efficient Divisor Class Halving on Genus Two Curves….Pages 317-326
Message Authentication on 64-Bit Architectures….Pages 327-341
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme….Pages 342-357
Constructing an Ideal Hash Function from Weak Ideal Compression Functions….Pages 358-375
Provably Good Codes for Hash Function Design….Pages 376-393
Back Matter….Pages –
Reviews
There are no reviews yet.