default search action
SAC 2008: Sackville, New Brunswick, Canada
- Roberto Maria Avanzi, Liam Keliher, Francesco Sica:
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers. Lecture Notes in Computer Science 5381, Springer 2009, ISBN 978-3-642-04158-7
Elliptic and Hyperelliptic Curve Arithmetic
- Peter Birkner, Nicolas Thériault:
Faster Halvings in Genus 2. 1-17 - Xinxin Fan, Guang Gong, David Jao:
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. 18-34 - Philipp Grabher, Johann Großschädl, Dan Page:
On Software Parallel Implementation of Cryptographic Pairings. 35-50
Block Ciphers I
- Jonathan Etrog, Matthew J. B. Robshaw:
The Cryptanalysis of Reduced-Round SMS4. 51-65 - Jacques Patarin, Yannick Seurin:
Building Secure Block Ciphers on Generic Attacks Assumptions. 66-81
First Invited Talk
- Joseph H. Silverman:
Lifting and Elliptic Curve Discrete Logarithms. 82-102
Hash Functions I
- Kazumaro Aoki, Yu Sasaki:
Preimage Attacks on One-Block MD4, 63-Step MD5 and More. 103-119 - Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. 120-135 - Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer:
Cryptanalysis of Tweaked Versions of SMASH and Reparation. 136-150
Mathematical Aspects of Applied Cryptography I
- Ramakanth Kavuluru, Andrew Klapper:
Counting Functions for the k-Error Linear Complexity of 2n-Periodic Binary Sequences. 151-164 - Matthieu Rivain:
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. 165-183
Stream Ciphers Cryptanalysis
- Côme Berbain, Henri Gilbert, Antoine Joux:
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. 184-198 - Erik Zenner:
A Cache Timing Analysis of HC-256. 199-213 - Bin Zhang, Dengguo Feng:
An Improved Fast Correlation Attack on Stream Ciphers. 214-227
Hash Functions II
- Elena Andreeva, Bart Preneel:
A Three-Property-Secure Hash Function. 228-244 - Charles Bouillaguet, Pierre-Alain Fouque:
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques. 245-261 - Shoichi Hirose, Hidenori Kuwakado:
A Scheme to Base a Hash Function on a Block Cipher. 262-275 - Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and Other Non-random Properties for Step-Reduced SHA-256. 276-293
Cryptography with Algebraic Curves
- Somayeh Heidarvand, Jorge L. Villar:
Public Verifiability from Pairings in Secret Sharing Schemes. 294-308 - Kristin E. Lauter, Katherine E. Stange:
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences. 309-327
Second Invited Talk - Stafford Tavares Lecture
- Jacques Patarin:
The "Coefficients H" Technique. 328-345
Mathematical Aspects of Applied Cryptography II
- Frédéric Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane:
Distinguishing Multiplications from Squaring Operations. 346-360 - Éric Schost, Arash Hariri:
Subquadratic Polynomial Multiplication over GF(2m) Using Trinomial Bases and Chinese Remaindering. 361-372 - Kyohei Suzuki, Tetsu Iwata:
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators. 373-386
Curve-Based Primitives in Hardware
- Junfeng Fan, Lejla Batina, Ingrid Verbauwhede:
HECC Goes Embedded: An Area-Efficient Implementation of HECC. 387-400 - Daniel M. Hein, Johannes Wolkerstorfer, Norbert Felber:
ECC Is Ready for RFID - A Proof in Silicon. 401-413
Block Ciphers II
- Wil Michiels, Paul Gorissen, Henk D. L. Hollmann:
Cryptanalysis of a Generic Class of White-Box Implementations. 414-428 - Meiqin Wang, Xiaoyun Wang, Changhui Hu:
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. 429-441 - Wenling Wu, Lei Zhang, Wentao Zhang:
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. 442-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.