default search action
SAC 2007: Ottawa, Canada
- Carlisle M. Adams, Ali Miri, Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4876, Springer 2007, ISBN 978-3-540-77359-7 - Shahram Khazaei, Simon Fischer, Willi Meier:
Reduced Complexity Attacks on the Alternating Step Generator. 1-16 - Dirk Stegemann:
Extended BDD-Based Cryptanalysis of Keystream Generators. 17-35 - Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. 36-55 - Christophe De Cannière, Florian Mendel, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. 56-73 - Matthew Henricksen, Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function. 74-83 - Andrey Bogdanov:
Improved Side-Channel Collision Attacks on AES. 84-95 - Johannes Blömer, Volker Krummel:
Analysis of Countermeasures Against Access Driven Cache Attacks on AES. 96-109 - Frédéric Amiel, Benoit Feix, Karine Villegas:
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. 110-125 - Billy Bob Brumley, Kimmo U. Järvinen:
Koblitz Curves and Integer Equivalents of Frobenius Expansions. 126-137 - Roberto Maria Avanzi:
Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic. 138-154 - Xinxin Fan, Guang Gong:
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. 155-172 - Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi:
Explicit Formulas for Efficient Multiplication in \mathbbF36m. 173-183 - Thomas Baignères, Jacques Stern, Serge Vaudenay:
Linear Cryptanalysis of Non Binary Ciphers. 184-211 - Gaoli Wang, Nathan Keller, Orr Dunkelman:
The Delicate Issues of Addition with Respect to XOR Differences. 212-231 - Håvard Raddum:
MRHS Equation Systems. 232-245 - Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita:
A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. 246-263 - Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel:
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. 264-277 - Louis Goubin, Jean-Michel Masereel, Michaël Quisquater:
Cryptanalysis of White Box DES Implementations. 278-295 - Georg Illies, Marian Margraf:
Attacks on the ESA-PSS-04-151 MAC Scheme. 296-310 - David A. McGrew, Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation. 311-327 - David Lefranc, Philippe Painchault, Valérie Rouat, Emmanuel Mayer:
A Generic Method to Design Modes of Operation Beyond the Birthday Bound. 328-343 - Serge Vaudenay, Martin Vuagnoux:
Passive-Only Key Recovery Attacks on RC4. 344-359 - Goutam Paul, Subhamoy Maitra:
Permutation After RC4 Key Scheduling Reveals the Secret Key. 360-377 - Aline Gouget, Hervé Sibert:
Revisiting Correlation-Immunity in Filter Generators. 378-395 - Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima:
Distinguishing Attack Against TPypy. 396-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.