Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /

SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen’s U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton University i...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Preneel, Bart (Επιμελητής έκδοσης), Tavares, Stafford (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 3897
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Stream Ciphers I
  • Conditional Estimators: An Effective Attack on A5/1
  • Cryptanalysis of the F-FCSR Stream Cipher Family
  • Fault Attacks on Combiners with Memory
  • Block Ciphers
  • New Observation on Camellia
  • Proving the Security of AES Substitution-Permutation Network
  • Modes of Operation
  • An Attack on CFB Mode Encryption as Used by OpenPGP
  • Parallelizable Authentication Trees
  • Improved Time-Memory Trade-Offs with Multiple Data
  • Public Key Cryptography
  • A Space Efficient Backdoor in RSA and Its Applications
  • An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
  • Stream Ciphers II
  • On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
  • Rekeying Issues in the MUGI Stream Cipher
  • Key Establishment Protocols and Access Control
  • Tree-Based Key Distribution Patterns
  • Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
  • An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
  • Hash Functions
  • Breaking a New Hash Function Design Strategy Called SMASH
  • Analysis of a SHA-256 Variant
  • Impact of Rotations in SHA-1 and Related Hash Functions
  • Protocols for RFID Tags
  • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
  • Reducing Time Complexity in RFID Systems
  • Efficient Implementations
  • Accelerated Verification of ECDSA Signatures
  • Pairing-Friendly Elliptic Curves of Prime Order
  • Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
  • SPA Resistant Left-to-Right Integer Recodings
  • Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .