Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed postproceedings of the 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003, held in Ottawa, Canada, in August 2003.

The 25 revised full papers presented were carefully selected from 85 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic and hyperelliptic curves, side channel attacks, security protocols and applications, cryptanalysis, cryptographic primitives, stream ciphers, and efficient implementations.

Author(s): Jan Pelzl, Thomas Wollinger, Christof Paar (auth.), Mitsuru Matsui, Robert J. Zuccherato (eds.)
Series: Lecture Notes in Computer Science 3006
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 368
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl.Internet); Management of Computing and Information Systems

Front Matter....Pages -
Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves....Pages 1-16
On the Selection of Pairing-Friendly Groups....Pages 17-25
Counting Points for Hyperelliptic Curves of Type  y 2 = x 5 + ax over Finite Prime Fields....Pages 26-41
Longer Keys May Facilitate Side Channel Attacks....Pages 42-57
On Randomizing Private Keys to Counteract DPA Attacks....Pages 58-72
Zero Common-Knowledge Authentication for Pervasive Networks....Pages 73-87
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks....Pages 88-100
Broadcast Enforced Threshold Schemes with Disenrollment....Pages 101-116
A New Meet-in-the-Middle Attack on the IDEA Block Cipher....Pages 117-129
Cryptanalysis of the Alleged SecurID Hash Function....Pages 130-144
Authenticated On-Line Encryption....Pages 145-159
Five Practical Attacks for “Optimistic Mixing for Exit-Polls”....Pages 160-174
Security Analysis of SHA-256 and Sisters....Pages 175-193
A Chosen IV Attack Against Turing ....Pages 194-207
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants....Pages 208-221
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method....Pages 222-233
On the Use of GF-Inversion as a Cryptographic Primitive....Pages 234-247
Cryptographic Applications of T-Functions....Pages 248-261
On the Success of the Embedding Attack on the Alternating Step Generator....Pages 262-274
Additive Autocorrelation of Resilient Boolean Functions....Pages 275-290
On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators....Pages 291-305
Alternative Digit Sets for Nonadjacent Representations....Pages 306-319
Generic Efficient Arithmetic Algorithms for PAFFs ( P rocessor A dequate F inite F ields) and Related Algebraic Structures....Pages 320-334
More Generalized Mersenne Numbers....Pages 335-347
Lower Bound on Linear Authenticated Encryption....Pages 348-360
Back Matter....Pages -