×

zbMATH — the first resource for mathematics

Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. (English) Zbl 1208.94008
Lecture Notes in Computer Science 6544. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). xiii, 411 p. (2011).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1177.94012).
Indexed articles:
Boura, Christina; Canteaut, Anne, Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256, 1-17 [Zbl 1290.94048]
Bouillaguet, Charles; Dunkelman, Orr; Leurent, Gaëan; Fouque, Pierre-Alain, Attacks on hash functions based on Generalized Feistel: application to reduced-round Lesamnta and SHAvite-3\(_{512}\), 18-35 [Zbl 1290.94047]
Mouha, Nicky; Velichkov, Vesselin; De Cannière, Christophe; Preneel, Bart, The differential analysis of S-functions, 36-56 [Zbl 1290.94112]
Borghoff, Julia; Knudsen, Lars R.; Matusiewicz, Krystian, Hill climbing algorithms and Trivium, 57-73 [Zbl 1290.94046]
Sepehrdad, Pouyan; Vaudenay, Serge; Vuagnoux, Martin, Discovery and exploitation of new biases in RC4, 74-91 [Zbl 1290.94128]
Martin, Keith M., The rise and fall and rise of combinatorial key predistribution, 92-98 [Zbl 1290.94109]
Detrey, Jérémie; Gaudry, Pierrick; Khalfallah, Karim, A low-area yet performant FPGA implementation of Shabal, 99-113 [Zbl 1290.94062]
Plos, Thomas; Groß, Hannes; Feldhofer, Martin, Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags, 114-129 [Zbl 1290.94120]
Struik, René, Batch computations revisited: combining key computations and batch verifications, 130-142 [Zbl 1290.94157]
Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane, Wild McEliece, 143-158 [Zbl 1290.94041]
Finiasz, Matthieu, Parallel-CFS: strengthening the CFS McEliece-based signature scheme, 159-170 [Zbl 1292.94062]
Cayrel, Pierre-Louis; Véron, Pascal; Alaoui, Sidi Mohamed El Yousfi, A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem, 171-186 [Zbl 1292.94045]
Lamberger, Mario; Rijmen, Vincent, Optimal covering codes for finding near-collisions, 187-197 [Zbl 1293.94084]
Nikolić, Ivica, Tweaking AES, 198-210 [Zbl 1293.94091]
Shibutani, Kyoji, On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis, 211-228 [Zbl 1293.94095]
Bogdanov, Andrey; Rechberger, Christian, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN, 229-240 [Zbl 1292.94032]
Pan, Jing; van Woudenberg, Jasper G. J.; den Hartog, Jerry I.; Witteman, Marc F., Improving DPA by peak distribution analysis, 241-261 [Zbl 1293.94092]
Fumaroli, Guillaume; Martinelli, Ange; Prouff, Emmanuel; Rivain, Matthieu, Affine masking against higher-order side channel analysis, 262-280 [Zbl 1293.94065]
Boldyreva, Alexandra, Search on encrypted data in the symmetric-key setting, 281 [Zbl 1293.94056]
Petit, Christophe; Quisquater, Jean-Jacques, Preimages for the Tillich-Zémor hash function, 282-301 [Zbl 1290.94119]
Mohassel, Payman, One-time signatures and chameleon hash functions, 302-319 [Zbl 1293.94090]
Armknecht, Frederik; Furukawa, Jun, On the minimum communication effort for secure group key exchange, 320-337 [Zbl 1293.94099]
Guo, Jian; Thomsen, Søren S., Deterministic differential properties of the compression function of BMW, 338-350 [Zbl 1293.94071]
Bouillaguet, Charles; Fouque, Pierre-Alain; Leurent, Gaëtan, Security analysis of SIMD, 351-368 [Zbl 1293.94057]
Schläffer, Martin, Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function, 369-387 [Zbl 1293.94094]
Khovratovich, Dmitry; Naya-Plasencia, María; Röck, Andrea; Schläffer, Martin, Cryptanalysis of Luffa v2 components, 388-409 [Zbl 1293.94083]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
PDF BibTeX XML Cite
Full Text: DOI