Selected Areas in Cryptography 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the fol...

Full description

Bibliographic Details
Other Authors: Jacobson, Michael J. (Editor), Rijmen, Vincent (Editor), Safavi-Naini, Rei (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2009, 2009
Edition:1st ed. 2009
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Hash Functions I
  • Practical Collisions for SHAMATA-256
  • Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
  • Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function
  • Miscellaneous Techniques
  • More on Key Wrapping
  • Information Theoretically Secure Multi Party Set Intersection Re-visited
  • Real Traceable Signatures
  • Hash Functions II
  • Cryptanalysis of Hash Functions with Structures
  • Cryptanalysis of the LANE Hash Function
  • Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
  • Hardware Implementation and Cryptanalysis
  • A More Compact AES
  • Optimization Strategies for Hardware-Based Cofactorization
  • More on the Security of Linear RFID Authentication Protocols
  • Differential Fault Analysis of Rabbit
  • An Improved Recovery Algorithm for Decayed AES Key Schedule Images
  • Block Ciphers
  • Cryptanalysis of the Full MMB Block Cipher
  • Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis
  • Improved Integral Attacks on MISTY1
  • New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
  • Modes of Operation
  • Format-Preserving Encryption
  • BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
  • Implementation of Public Key Cryptography
  • On Repeated Squarings in Binary Fields
  • Highly Regular m-Ary Powering Ladders
  • An Efficient Residue Group Multiplication for the ? T Pairing over
  • Compact McEliece Keys from Goppa Codes
  • Hash Functions and Stream Ciphers
  • Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
  • Cryptanalysis of Dynamic SHA(2)
  • A New Approach for FCSRs
  • New Cryptanalysis of Irregularly Decimated Stream Ciphers