Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Biham, Eli (Επιμελητής έκδοσης), Youssef, Amr M. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4356
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Block Cipher Cryptanalysis
  • Improved DST Cryptanalysis of IDEA
  • Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
  • Related-Key Rectangle Attack on the Full SHACAL-1
  • Stream Cipher Cryptanalysis I
  • Cryptanalysis of Achterbahn-Version 2
  • Cryptanalysis of the Stream Cipher ABC v2
  • The Design of a Stream Cipher LEX
  • Dial C for Cipher
  • Improved Security Analysis of XEX and LRW Modes
  • Extended Hidden Number Problem and Its Cryptanalytic Applications
  • Changing the Odds Against Masked Logic
  • Advances on Access-Driven Cache Attacks on AES
  • Blind Differential Cryptanalysis for Enhanced Power Attacks
  • Efficient Implementations I
  • Efficient Implementations of Multivariate Quadratic Systems
  • Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication
  • Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems
  • Stream Cipher Cryptanalysis II
  • On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2
  • Multi-pass Fast Correlation Attack on Stream Ciphers
  • Crossword Puzzle Attack on NLS
  • Invited Talk
  • When Stream Cipher Analysis Meets Public-Key Cryptography
  • Efficient Implementations II
  • On Redundant ?-Adic Expansions and Non-adjacent Digit Sets
  • Pairing Calculation on Supersingular Genus 2 Curves
  • Efficient Divisor Class Halving on Genus Two Curves
  • Message Authentication on 64-Bit Architectures
  • Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme
  • Constructing an Ideal Hash Function from Weak Ideal Compression Functions
  • Provably Good Codes for Hash Function Design.