×

zbMATH — the first resource for mathematics

Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. (English) Zbl 1121.94001
Lecture Notes in Computer Science 4356. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). xi, 395 p. (2007).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1120.94003).
Indexed articles:
Ayaz, Eyüp Serdar; Selçuk, Ali Aydın, Improved DST cryptanalysis of IDEA, 1-14 [Zbl 1161.94381]
Zhang, Wentao; Wu, Wenling; Zhang, Lei; Feng, Dengguo, Improved related-key impossible differential attacks on reduced-round AES-192, 15-27 [Zbl 1161.94434]
Dunkelman, Orr; Keller, Nathan; Kim, Jongsung, Related-key rectangle attack on the full SHACAL-1, 28-44 [Zbl 1161.94396]
Hell, Martin; Johansson, Thomas, Cryptanalysis of Achterbahn-version 2, 45-55 [Zbl 1161.94405]
Wu, Hongjun; Preneel, Bart, Cryptanalysis of the stream cipher ABC v2, 56-66 [Zbl 1161.94430]
Biryukov, Alex, The design of a stream cipher LEX, 67-75 [Zbl 1161.94387]
Baignères, Thomas; Finiasz, Matthieu, Dial C for cipher, 76-95 [Zbl 1161.94382]
Minematsu, Kazuhiko, Improved security analysis of XEX and LRW modes, 96-113 [Zbl 1161.94420]
Hlaváč, Martin; Rosa, Tomáš, Extended hidden number problem and its cryptanalytic applications, 114-133 [Zbl 1161.94407]
Tiri, Kris; Schaumont, Patrick, Changing the odds against masked logic, 134-146 [Zbl 1161.94427]
Neve, Michael; Seifert, Jean-Pierre, Advances on access-driven cache attacks on AES, 147-162 [Zbl 1161.94421]
Handschuh, Helena; Preneel, Bart, Blind differential cryptanalysis for enhanced power attacks, 163-173 [Zbl 1161.94403]
Berbain, Côme; Billet, Olivier; Gilbert, Henri, Efficient implementations of multivariate quadratic systems, 174-187 [Zbl 1161.94385]
Yoshino, Masayuki; Okeya, Katsuyuki; Vuillaume, Camille, Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication, 188-202 [Zbl 1161.94432]
Avanzi, Roberto Maria, Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems, 203-219 [Zbl 1161.94379]
Hell, Martin; Johansson, Thomas, On the problem of finding linear approximations and cryptanalysis of Pomaranch version 2, 220-233 [Zbl 1161.94406]
Zhang, Bin; Feng, Dengguo, Multi-pass fast correlation attack on stream ciphers, 234-248 [Zbl 1161.94433]
Cho, Joo Yeon; Pieprzyk, Josef, Crossword puzzle attack on NLS, 249-265 [Zbl 1161.94392]
Finiasz, Matthieu; Vaudenay, Serge, When stream cipher analysis meets public-key cryptography, 266-284 [Zbl 1161.94398]
Avanzi, Roberto Maria; Heuberger, Clemens; Prodinger, Helmut, On redundant \(\tau\)-adic expansions and non-adjacent digit sets, 285-301 [Zbl 1161.94380]
Ó hÉigeartaigh, Colm; Scott, Michael, Pairing calculation on supersingular genus 2 curves, 302-316 [Zbl 1161.94423]
Birkner, Peter, Efficient divisor class halving on genus two curves, 317-326 [Zbl 1161.94386]
Krovetz, Ted, Message authentication on 64-bit architectures, 327-341 [Zbl 1161.68444]
Jakimoski, Goce, Some notes on the security of the timed efficient stream loss-tolerant authentication scheme, 342-357 [Zbl 1161.68441]
Liskov, Moses, Constructing an ideal hash function from weak ideal compression functions, 358-375 [Zbl 1161.68445]
Jutla, Charanjit S.; Patthak, Anindya C., Provably good codes for hash function design, 376-393 [Zbl 1161.68442]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Software:
LEX
PDF BibTeX XML Cite
Full Text: DOI