This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006.
The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.
Author(s): Eyüp Serdar Ayaz, Ali Aydın Selçuk (auth.), Eli Biham, Amr M. Youssef (eds.)
Series: Lecture Notes in Computer Science 4356
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 395
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl.Internet)
Front Matter....Pages -
Improved DST Cryptanalysis of IDEA....Pages 1-14
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192....Pages 15-27
Related-Key Rectangle Attack on the Full SHACAL-1....Pages 28-44
Cryptanalysis of Achterbahn-Version 2....Pages 45-55
Cryptanalysis of the Stream Cipher ABC v2....Pages 56-66
The Design of a Stream Cipher LEX....Pages 67-75
Dial C for Cipher....Pages 76-95
Improved Security Analysis of XEX and LRW Modes....Pages 96-113
Extended Hidden Number Problem and Its Cryptanalytic Applications....Pages 114-133
Changing the Odds Against Masked Logic....Pages 134-146
Advances on Access-Driven Cache Attacks on AES....Pages 147-162
Blind Differential Cryptanalysis for Enhanced Power Attacks....Pages 163-173
Efficient Implementations of Multivariate Quadratic Systems....Pages 174-187
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication....Pages 188-202
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems....Pages 203-219
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2....Pages 220-233
Multi-pass Fast Correlation Attack on Stream Ciphers....Pages 234-248
Crossword Puzzle Attack on NLS....Pages 249-265
When Stream Cipher Analysis Meets Public-Key Cryptography....Pages 266-284
On Redundant τ -Adic Expansions and Non-adjacent Digit Sets....Pages 285-301
Pairing Calculation on Supersingular Genus 2 Curves....Pages 302-316
Efficient Divisor Class Halving on Genus Two Curves....Pages 317-326
Message Authentication on 64-Bit Architectures....Pages 327-341
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme....Pages 342-357
Constructing an Ideal Hash Function from Weak Ideal Compression Functions....Pages 358-375
Provably Good Codes for Hash Function Design....Pages 376-393
Back Matter....Pages -