default search action
SAC 2004: Waterloo, Ontario, Canada
- Helena Handschuh, M. Anwar Hasan:
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3357, Springer 2004, ISBN 3-540-24327-5
Stream Cipher Cryptanalysis
- Alexander Maximov, Thomas Johansson, Steve Babbage:
An Improved Correlation Attack on A5/1. 1-18 - Frederik Armknecht, Joseph Lano, Bart Preneel:
Extending the Resynchronization Attack. 19-38 - Håkan Englund, Thomas Johansson:
A New Simple Technique to Attack Filter Generators and Related Ciphers. 39-53
Side-Channel Analysis
- Dan Page, Martijn Stam:
On XTR and Side-Channel Analysis. 54-68 - Johannes Blömer, Jorge Guajardo, Volker Krummel:
Provably Secure Masking of AES. 69-83
Block Cipher Design
- Pascal Junod, Serge Vaudenay:
Perfect Diffusion Primitives for Block Ciphers. 84-99 - Gilles Piret, Jean-Jacques Quisquater:
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. 100-113 - Pascal Junod, Serge Vaudenay:
FOX : A New Family of Block Ciphers. 114-129
Efficient Implementations
- Roberto Maria Avanzi:
A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. 130-143 - Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong:
Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. 144-158 - Jean-Claude Bajard, Laurent Imbert, Thomas Plantard:
Modular Number Systems: Beyond the Mersenne Family. 159-169 - Tanja Lange, Marc Stevens:
Efficient Doubling on Genus Two Curves over Binary Fields. 170-181
Secret Key Cryptography I
- Duong Hieu Phan, David Pointcheval:
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). 182-197 - Adam L. Young, Moti Yung:
A Subliminal Channel in Secret Block Ciphers. 198-211 - Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard:
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. 212-226
Cryptanalysis
- Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi:
Cryptanalysis of a White Box AES Implementation. 227-240 - Joachim von zur Gathen, Igor E. Shparlinski:
Predicting Subset Sum Pseudorandom Generators. 241-251 - Wenling Wu, Dengguo Feng, Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia. 252-266
Cryptographic Protocols
- Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. 267-279 - Ruizhong Wei, Jiang Wu:
Product Construction of Key Distribution Schemes for Sensor Networks. 280-293 - Jooyoung Lee, Douglas R. Stinson:
Deterministic Key Predistribution Schemes for Distributed Sensor Networks. 294-307 - Ventzislav Nikov, Svetla Nikova:
On Proactive Secret Sharing Schemes. 308-325
Secret Key Cryptography II
- Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram:
Efficient Constructions of Variable-Input-Length Block Ciphers. 326-340 - Mridul Nandi:
A Sufficient Condition for Optimal Domain Extension of UOWHFs. 341-354
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.