Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /
SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen's U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton Univers...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3897 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Stream Ciphers I
- Conditional Estimators: An Effective Attack on A5/1
- Cryptanalysis of the F-FCSR Stream Cipher Family
- Fault Attacks on Combiners with Memory
- Block Ciphers
- New Observation on Camellia
- Proving the Security of AES Substitution-Permutation Network
- Modes of Operation
- An Attack on CFB Mode Encryption as Used by OpenPGP
- Parallelizable Authentication Trees
- Improved Time-Memory Trade-Offs with Multiple Data
- Public Key Cryptography
- A Space Efficient Backdoor in RSA and Its Applications
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism
- Stream Ciphers II
- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
- Rekeying Issues in the MUGI Stream Cipher
- Key Establishment Protocols and Access Control
- Tree-Based Key Distribution Patterns
- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
- Hash Functions
- Breaking a New Hash Function Design Strategy Called SMASH
- Analysis of a SHA-256 Variant
- Impact of Rotations in SHA-1 and Related Hash Functions
- Protocols for RFID Tags
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
- Reducing Time Complexity in RFID Systems
- Efficient Implementations
- Accelerated Verification of ECDSA Signatures
- Pairing-Friendly Elliptic Curves of Prime Order
- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving
- SPA Resistant Left-to-Right Integer Recodings
- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .