Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /
SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen’s U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton University i...
| Συγγραφή απο Οργανισμό/Αρχή: | |
|---|---|
| Άλλοι συγγραφείς: | , |
| Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
| Γλώσσα: | English |
| Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
| Σειρά: | Lecture Notes in Computer Science,
3897 |
| Θέματα: | |
| Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Stream Ciphers I
- Conditional Estimators: An Effective Attack on A5/1
- Cryptanalysis of the F-FCSR Stream Cipher Family
- Fault Attacks on Combiners with Memory
- Block Ciphers
- New Observation on Camellia
- Proving the Security of AES Substitution-Permutation Network
- Modes of Operation
- An Attack on CFB Mode Encryption as Used by OpenPGP
- Parallelizable Authentication Trees
- Improved Time-Memory Trade-Offs with Multiple Data
- Public Key Cryptography
- A Space Efficient Backdoor in RSA and Its Applications
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
- Stream Ciphers II
- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
- Rekeying Issues in the MUGI Stream Cipher
- Key Establishment Protocols and Access Control
- Tree-Based Key Distribution Patterns
- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
- Hash Functions
- Breaking a New Hash Function Design Strategy Called SMASH
- Analysis of a SHA-256 Variant
- Impact of Rotations in SHA-1 and Related Hash Functions
- Protocols for RFID Tags
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
- Reducing Time Complexity in RFID Systems
- Efficient Implementations
- Accelerated Verification of ECDSA Signatures
- Pairing-Friendly Elliptic Curves of Prime Order
- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
- SPA Resistant Left-to-Right Integer Recodings
- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .