Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers

Bibliographic Details
Other Authors: Biham, Eli (Editor), Youssef, Amr M. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2007, 2007
Edition:1st ed. 2007
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Block Cipher Cryptanalysis
  • Improved DST Cryptanalysis of IDEA
  • Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
  • Related-Key Rectangle Attack on the Full SHACAL-1
  • Stream Cipher Cryptanalysis I
  • Cryptanalysis of Achterbahn-Version 2
  • Cryptanalysis of the Stream Cipher ABC v2
  • The Design of a Stream Cipher LEX
  • Dial C for Cipher
  • Improved Security Analysis of XEX and LRW Modes
  • Extended Hidden Number Problem and Its Cryptanalytic Applications
  • Changing the Odds Against Masked Logic
  • Advances on Access-Driven Cache Attacks on AES
  • Blind Differential Cryptanalysis for Enhanced Power Attacks
  • Efficient Implementations I
  • Efficient Implementations of Multivariate Quadratic Systems
  • Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication
  • Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems
  • Stream Cipher Cryptanalysis II
  • On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2
  • Multi-pass Fast Correlation Attack on Stream Ciphers
  • Crossword Puzzle Attack on NLS
  • Invited Talk
  • When Stream Cipher Analysis Meets Public-Key Cryptography
  • Efficient Implementations II
  • On Redundant ?-Adic Expansions and Non-adjacent Digit Sets
  • Pairing Calculation on Supersingular Genus 2 Curves
  • Efficient Divisor Class Halving on Genus Two Curves
  • Message Authentication on 64-Bit Architectures
  • Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme
  • Constructing an Ideal Hash Function from Weak Ideal Compression Functions
  • Provably Good Codes for Hash Function Design