Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4356 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Block Cipher Cryptanalysis
- Improved DST Cryptanalysis of IDEA
- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
- Related-Key Rectangle Attack on the Full SHACAL-1
- Stream Cipher Cryptanalysis I
- Cryptanalysis of Achterbahn-Version 2
- Cryptanalysis of the Stream Cipher ABC v2
- The Design of a Stream Cipher LEX
- Dial C for Cipher
- Improved Security Analysis of XEX and LRW Modes
- Extended Hidden Number Problem and Its Cryptanalytic Applications
- Changing the Odds Against Masked Logic
- Advances on Access-Driven Cache Attacks on AES
- Blind Differential Cryptanalysis for Enhanced Power Attacks
- Efficient Implementations I
- Efficient Implementations of Multivariate Quadratic Systems
- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication
- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems
- Stream Cipher Cryptanalysis II
- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2
- Multi-pass Fast Correlation Attack on Stream Ciphers
- Crossword Puzzle Attack on NLS
- Invited Talk
- When Stream Cipher Analysis Meets Public-Key Cryptography
- Efficient Implementations II
- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets
- Pairing Calculation on Supersingular Genus 2 Curves
- Efficient Divisor Class Halving on Genus Two Curves
- Message Authentication on 64-Bit Architectures
- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Provably Good Codes for Hash Function Design.