Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006.

The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Author(s): Eyüp Serdar Ayaz, Ali Aydın Selçuk (auth.), Eli Biham, Amr M. Youssef (eds.)
Series: Lecture Notes in Computer Science 4356
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 395
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl.Internet)

Front Matter....Pages -
Improved DST Cryptanalysis of IDEA....Pages 1-14
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192....Pages 15-27
Related-Key Rectangle Attack on the Full SHACAL-1....Pages 28-44
Cryptanalysis of Achterbahn-Version 2....Pages 45-55
Cryptanalysis of the Stream Cipher ABC v2....Pages 56-66
The Design of a Stream Cipher LEX....Pages 67-75
Dial C for Cipher....Pages 76-95
Improved Security Analysis of XEX and LRW Modes....Pages 96-113
Extended Hidden Number Problem and Its Cryptanalytic Applications....Pages 114-133
Changing the Odds Against Masked Logic....Pages 134-146
Advances on Access-Driven Cache Attacks on AES....Pages 147-162
Blind Differential Cryptanalysis for Enhanced Power Attacks....Pages 163-173
Efficient Implementations of Multivariate Quadratic Systems....Pages 174-187
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication....Pages 188-202
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems....Pages 203-219
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2....Pages 220-233
Multi-pass Fast Correlation Attack on Stream Ciphers....Pages 234-248
Crossword Puzzle Attack on NLS....Pages 249-265
When Stream Cipher Analysis Meets Public-Key Cryptography....Pages 266-284
On Redundant τ -Adic Expansions and Non-adjacent Digit Sets....Pages 285-301
Pairing Calculation on Supersingular Genus 2 Curves....Pages 302-316
Efficient Divisor Class Halving on Genus Two Curves....Pages 317-326
Message Authentication on 64-Bit Architectures....Pages 327-341
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme....Pages 342-357
Constructing an Ideal Hash Function from Weak Ideal Compression Functions....Pages 358-375
Provably Good Codes for Hash Function Design....Pages 376-393
Back Matter....Pages -