default search action
SAC 2012: Windsor, Ontario, Canada
- Lars R. Knudsen, Huapeng Wu:
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7707, Springer 2013, ISBN 978-3-642-35998-9
Cryptanalysis
- Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. 1-15 - Zhenyu Huang, Dongdai Lin:
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery. 16-33 - Yoni De Mulder, Peter Roelse, Bart Preneel:
Cryptanalysis of the Xiao - Lai White-Box AES Implementation. 34-49
Digital Signatures
- David Galindo, Srinivas Vivek:
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. 50-65 - Andreas Hülsing, Christoph Busold, Johannes Buchmann:
Forward Secure Signatures on Smart Cards. 66-80
The Stafford Tavares Lecture
- Vincent Rijmen:
Extracts from the SHA-3 Competition. 81-85
Stream Ciphers
- Alex Biryukov, Gaëtan Leurent, Arnab Roy:
Cryptanalysis of the "Kindle" Cipher. 86-103 - Kalikinkar Mandal, Guang Gong:
Cryptographically Strong de Bruijn Sequences with Large Periods. 104-118 - Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the Loiss Stream Cipher. 119-134
Implementations
- Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao:
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three. 135-148 - Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao:
Efficient Implementation of Bilinear Pairings on ARM Processors. 149-165 - Jithra Adikari, M. Anwar Hasan, Christophe Nègre:
Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$. 166-183 - Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann:
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. 184-201
Block Cipher Cryptanalysis
- Takanori Isobe, Kyoji Shibutani:
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. 202-221 - Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. 222-233 - Yu Sasaki, Lei Wang:
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. 234-251
Lattices
- Jean-Charles Faugère, Christopher Goyet, Guénaël Renault:
Attacking (EC)DSA Given Only an Implicit Hint. 252-274 - Thomas Plantard, Willy Susilo, Zhenfei Zhang:
Lattice Reduction for Modular Knapsack. 275-286
Hash Functions
- Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. 287-303 - Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef:
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. 304-320 - Elena Andreeva, Atul Luykx, Bart Mennink:
Provable Security of BLAKE with Non-ideal Compression Function. 321-338
Block Cipher Constructions
- Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms. 339-354 - Shengbao Wu, Mingsheng Wang, Wenling Wu:
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. 355-371
Miscellaneous
- Matthieu Finiasz, Kannan Ramchandran:
Private Stream Search at Almost the Same Communication Cost as a Regular Search. 372-389 - Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert:
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks. 390-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.