Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers

SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen’s U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton University i...

Full description

Bibliographic Details
Other Authors: Preneel, Bart (Editor), Tavares, Stafford (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Stream Ciphers I
  • Conditional Estimators: An Effective Attack on A5/1
  • Cryptanalysis of the F-FCSR Stream Cipher Family
  • Fault Attacks on Combiners with Memory
  • Block Ciphers
  • New Observation on Camellia
  • Proving the Security of AES Substitution-Permutation Network
  • Modes of Operation
  • An Attack on CFB Mode Encryption as Used by OpenPGP
  • Parallelizable Authentication Trees
  • Improved Time-Memory Trade-Offs with Multiple Data
  • Public Key Cryptography
  • A Space Efficient Backdoor in RSA and Its Applications
  • An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
  • Stream Ciphers II
  • On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
  • Rekeying Issues in the MUGI Stream Cipher
  • Key Establishment Protocols and Access Control
  • Tree-Based Key Distribution Patterns
  • Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
  • An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
  • Hash Functions
  • Breaking a New Hash Function Design Strategy Called SMASH
  • Analysis of a SHA-256 Variant
  • Impact of Rotations in SHA-1 and Related Hash Functions
  • Protocols for RFID Tags
  • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
  • Reducing Time Complexity in RFID Systems
  • Efficient Implementations
  • Accelerated Verification of ECDSA Signatures
  • Pairing-Friendly Elliptic Curves of Prime Order
  • Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
  • SPA Resistant Left-to-Right Integer Recodings
  • Efficient FPGA-Based Karatsuba Multipliers for Polynomials over