default search action
SAC 2011: Toronto, Ontario, Canada
- Ali Miri, Serge Vaudenay:
Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7118, Springer 2012, ISBN 978-3-642-28495-3
Selected Areas in Cryptography 2011
- Yu Sasaki:
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. 1-18 - Jérémy Jean, María Naya-Plasencia, Martin Schläffer:
Improved Analysis of ECHO-256. 19-36 - Elena Andreeva, Bart Mennink:
Provable Chosen-Target-Forced-Midfix Preimage Resistance. 37-54 - Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren:
On CCA-Secure Somewhat Homomorphic Encryption. 55-72 - Daniel Slamanig:
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. 73-91 - Craig Costello, Kristin E. Lauter:
Group Law Computations on Jacobians of Hyperelliptic Curves. 92-117 - Markku-Juhani O. Saarinen:
Cryptographic Analysis of All 4 × 4-Bit S-Boxes. 118-133 - Matthias Krause, Matthias Hamann:
The Cryptographic Power of Random Selection. 134-150 - Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Proof of Empirical RC4 Biases and New Key Correlations. 151-168 - Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher. 169-184 - Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. 185-199 - Simon Knellwolf, Willi Meier, María Naya-Plasencia:
Conditional Differential Cryptanalysis of Trivium and KATAN. 200-212 - Martin Ågren:
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. 213-229 - Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau:
Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. 230-242 - Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent:
New Insights on Impossible Differential Cryptanalysis. 243-259 - Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. 260-277 - Toru Akishita, Harunaga Hiwatari:
Very Compact Hardware Implementations of the Blockcipher CLEFIA. 278-292 - Sanjit Chatterjee, Alfred Menezes, Palash Sarkar:
Another Look at Tightness. 293-319 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. 320-337 - Yusuke Naito:
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles. 338-355 - Goce Jakimoski, Samant Khajuria:
ASC-1: An Authenticated Encryption Stream Cipher. 356-372 - Jérôme Plût:
On Various Families of Twisted Jacobi Quartics. 373-383 - Murat Cenk, Christophe Nègre, M. Anwar Hasan:
Improved Three-Way Split Formulas for Binary Polynomial Multiplication. 384-398 - Hugo Labrande, Michael J. Jacobson Jr.:
Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves. 399-411 - Laura Fuentes-Castañeda, Edward Knapp, Francisco Rodríguez-Henríquez:
Faster Hashing to ${\mathbb G}_2$. 412-430
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.