


default search action
SAC 2005: Waterloo, Ontario, Canada
- Bart Preneel, Stafford E. Tavares:
Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3897, Springer 2006, ISBN 3-540-33108-5
Stream Ciphers I
- Elad Barkan, Eli Biham:
Conditional Estimators: An Effective Attack on A5/1. 1-19 - Éliane Jaulmes, Frédéric Muller:
Cryptanalysis of the F-FCSR Stream Cipher Family. 20-35 - Frederik Armknecht
, Willi Meier:
Fault Attacks on Combiners with Memory. 36-50
Block Ciphers
- Duo Lei, Chao Li, Keqin Feng:
New Observation on Camellia. 51-64 - Thomas Baignères, Serge Vaudenay:
Proving the Security of AES Substitution-Permutation Network. 65-81
Modes of Operation
- Serge Mister, Robert J. Zuccherato:
An Attack on CFB Mode Encryption as Used by OpenPGP. 82-94 - William Eric Hall, Charanjit S. Jutla:
Parallelizable Authentication Trees. 95-109 - Alex Biryukov
, Sourav Mukhopadhyay, Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data. 110-127
Public Key Cryptography
- Adam L. Young, Moti Yung:
A Space Efficient Backdoor in RSA and Its Applications. 128-143 - Taek-Young Youn, Young-Ho Park
, Chang Han Kim, Jongin Lim:
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. 144-158
Stream Ciphers II
- An Braeken
, Joseph Lano:
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. 159-174 - Matthew Henricksen, Ed Dawson
:
Rekeying Issues in the MUGI Stream Cipher. 175-188
Key Establishment Protocols and Access Control
- Jooyoung Lee, Douglas R. Stinson:
Tree-Based Key Distribution Patterns. 189-204 - Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sang-Jae Moon:
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. 205-220 - Jiang Wu, Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. 221-232
Hash Functions
- Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
:
Breaking a New Hash Function Design Strategy Called SMASH. 233-244 - Hirotaka Yoshida, Alex Biryukov:
Analysis of a SHA-256 Variant. 245-260 - Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
:
Impact of Rotations in SHA-1 and Related Hash Functions. 261-275
Protocols for RFID Tags
- David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. 276-290 - Gildas Avoine, Etienne Dysli, Philippe Oechslin:
Reducing Time Complexity in RFID Systems. 291-306
Efficient Implementations
- Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone:
Accelerated Verification of ECDSA Signatures. 307-318 - Paulo S. L. M. Barreto, Michael Naehrig:
Pairing-Friendly Elliptic Curves of Prime Order. 319-331 - Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger:
Minimality of the Hamming Weight of the T-NAF for Koblitz Curves and Improved Combination with Point Halving. 332-344 - Nicolas Thériault:
SPA Resistant Left-to-Right Integer Recodings. 345-358 - Joachim von zur Gathen, Jamshid Shokrollahi:
Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F2. 359-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.