default search action
SAC 2002: St. John's, Newfoundland, Canada
- Kaisa Nyberg, Howard M. Heys:
Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers. Lecture Notes in Computer Science 2595, Springer 2003, ISBN 3-540-00622-2
Elliptic Curve Enhancements
- John Malone-Lee, Nigel P. Smart:
Modifications of ECDSA. 1-12 - Dongryeol Kim, Seongan Lim:
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. 13-20 - Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater:
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. 21-36
SNOW
- Philip Hawkes, Gregory G. Rose:
Guess-and-Determine Attacks on SNOW. 37-46 - Patrik Ekdahl, Thomas Johansson:
A New Version of the Stream Cipher SNOW. 47-61
Encryption Schemes
- John Black, Phillip Rogaway, Thomas Shrimpton:
Encryption-Scheme Security in the Presence of Key-Dependent Messages. 62-75 - Jakob Jonsson:
On the Security of CTR + CBC-MAC. 76-93 - Soichi Furuya, Kouichi Sakurai:
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. 94-109
Differential Attacks
- Ben Reichardt, David A. Wagner:
Markov Truncated Differential Cryptanalysis of Skipjack. 110-128 - Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II). 129-146 - Hüseyin Demirci:
Square-like Attacks on Reduced Rounds of IDEA. 147-159 - Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. 160-174
Boolean Functions and Stream Ciphers
- Pascale Charpin, Enes Pasalic:
On Propagation Characteristics of Resilient Functions. 175-195 - Paul Camion, Miodrag J. Mihaljevic, Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). 196-213 - Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu:
Multiples of Primitive Polynomials and Their Products over GF(2). 214-231 - Sabine Leveiller, Gilles Zémor, Philippe Guillot, Joseph Boutros:
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function. 232-249
Block Cipher Security
- Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot:
White-Box Cryptography and an AES Implementation. 250-270 - Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. 271-290
Signatures and Secret Sharing
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. 291-309 - Florian Hess:
Efficient Identity Based Signature Schemes Based on Pairings. 310-324 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
The Group Diffie-Hellman Problems. 325-338
MAC and Hash Constructions
- Shoichi Hirose:
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. 339-352 - Sarvar Patel:
An Efficient MAC for Short Messages. 353-368
RSA and XTR Enhancements
- Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim:
Optimal Extension Fields for XTR. 369-384 - M. Jason Hinek, Mo King Low, Edlyn Teske:
On Some Attacks on Multi-prime RSA. 385-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.