Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen’s U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton University i...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006, 2006
|
Edition: | 1st ed. 2006 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Stream Ciphers I
- Conditional Estimators: An Effective Attack on A5/1
- Cryptanalysis of the F-FCSR Stream Cipher Family
- Fault Attacks on Combiners with Memory
- Block Ciphers
- New Observation on Camellia
- Proving the Security of AES Substitution-Permutation Network
- Modes of Operation
- An Attack on CFB Mode Encryption as Used by OpenPGP
- Parallelizable Authentication Trees
- Improved Time-Memory Trade-Offs with Multiple Data
- Public Key Cryptography
- A Space Efficient Backdoor in RSA and Its Applications
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
- Stream Ciphers II
- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
- Rekeying Issues in the MUGI Stream Cipher
- Key Establishment Protocols and Access Control
- Tree-Based Key Distribution Patterns
- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
- Hash Functions
- Breaking a New Hash Function Design Strategy Called SMASH
- Analysis of a SHA-256 Variant
- Impact of Rotations in SHA-1 and Related Hash Functions
- Protocols for RFID Tags
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
- Reducing Time Complexity in RFID Systems
- Efficient Implementations
- Accelerated Verification of ECDSA Signatures
- Pairing-Friendly Elliptic Curves of Prime Order
- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
- SPA Resistant Left-to-Right Integer Recodings
- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over