Cargando…

Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /

SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen's U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton Univers...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Preneel, Bart (Editor ), Tavares, Stafford (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3897
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Stream Ciphers I
  • Conditional Estimators: An Effective Attack on A5/1
  • Cryptanalysis of the F-FCSR Stream Cipher Family
  • Fault Attacks on Combiners with Memory
  • Block Ciphers
  • New Observation on Camellia
  • Proving the Security of AES Substitution-Permutation Network
  • Modes of Operation
  • An Attack on CFB Mode Encryption as Used by OpenPGP
  • Parallelizable Authentication Trees
  • Improved Time-Memory Trade-Offs with Multiple Data
  • Public Key Cryptography
  • A Space Efficient Backdoor in RSA and Its Applications
  • An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
  • Stream Ciphers II
  • On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
  • Rekeying Issues in the MUGI Stream Cipher
  • Key Establishment Protocols and Access Control
  • Tree-Based Key Distribution Patterns
  • Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
  • An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
  • Hash Functions
  • Breaking a New Hash Function Design Strategy Called SMASH
  • Analysis of a SHA-256 Variant
  • Impact of Rotations in SHA-1 and Related Hash Functions
  • Protocols for RFID Tags
  • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
  • Reducing Time Complexity in RFID Systems
  • Efficient Implementations
  • Accelerated Verification of ECDSA Signatures
  • Pairing-Friendly Elliptic Curves of Prime Order
  • Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
  • SPA Resistant Left-to-Right Integer Recodings
  • Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .