default search action
SAC 2006: Montreal, Canada
- Eli Biham, Amr M. Youssef:
Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers. Lecture Notes in Computer Science 4356, Springer 2007, ISBN 978-3-540-74461-0
Block Cipher Cryptanalysis
- Eyüp Serdar Ayaz, Ali Aydin Selçuk:
Improved DST Cryptanalysis of IDEA. 1-14 - Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. 15-27 - Orr Dunkelman, Nathan Keller, Jongsung Kim:
Related-Key Rectangle Attack on the Full SHACAL-1. 28-44
Stream Cipher Cryptanalysis I
- Martin Hell, Thomas Johansson:
Cryptanalysis of Achterbahn-Version 2. 45-55 - Hongjun Wu, Bart Preneel:
Cryptanalysis of the Stream Cipher ABC v2. 56-66
Block and Stream Ciphers
- Alex Biryukov:
The Design of a Stream Cipher LEX. 67-75 - Thomas Baignères, Matthieu Finiasz:
Dial C for Cipher. 76-95 - Kazuhiko Minematsu:
Improved Security Analysis of XEX and LRW Modes. 96-113
Side-Channel Attacks
- Martin Hlavác, Tomás Rosa:
Extended Hidden Number Problem and Its Cryptanalytic Applications. 114-133 - Kris Tiri, Patrick Schaumont:
Changing the Odds Against Masked Logic. 134-146 - Michael Neve, Jean-Pierre Seifert:
Advances on Access-Driven Cache Attacks on AES. 147-162 - Helena Handschuh, Bart Preneel:
Blind Differential Cryptanalysis for Enhanced Power Attacks. 163-173
Efficient Implementations I
- Côme Berbain, Olivier Billet, Henri Gilbert:
Efficient Implementations of Multivariate Quadratic Systems. 174-187 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. 188-202 - Roberto Maria Avanzi:
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems. 203-219
Stream Cipher Cryptanalysis II
- Martin Hell, Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. 220-233 - Bin Zhang, Dengguo Feng:
Multi-pass Fast Correlation Attack on Stream Ciphers. 234-248 - Joo Yeon Cho, Josef Pieprzyk:
Crossword Puzzle Attack on NLS. 249-265
Invited Talk
- Matthieu Finiasz, Serge Vaudenay:
When Stream Cipher Analysis Meets Public-Key Cryptography. 266-284
Efficient Implementations II
- Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger:
On Redundant tau -Adic Expansions and Non-adjacent Digit Sets. 285-301 - Colm O'hEigeartaigh, Michael Scott:
Pairing Calculation on Supersingular Genus 2 Curves. 302-316 - Peter Birkner:
Efficient Divisor Class Halving on Genus Two Curves. 317-326
Message Authentication Codes
- Ted Krovetz:
Message Authentication on 64-Bit Architectures. 327-341 - Goce Jakimoski:
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. 342-357
Hash Functions
- Moses D. Liskov:
Constructing an Ideal Hash Function from Weak Ideal Compression Functions. 358-375 - Charanjit S. Jutla, Anindya C. Patthak:
Provably Good Codes for Hash Function Design. 376-393
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.