Cargando…

Selected Areas in Cryptography 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Avanzi, Roberto (Editor ), Keliher, Liam (Editor ), Sica, Francesco (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5381
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Elliptic and Hyperelliptic Curve Arithmetic
  • Faster Halvings in Genus 2
  • Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
  • On Software Parallel Implementation of Cryptographic Pairings
  • Block Ciphers I
  • The Cryptanalysis of Reduced-Round SMS4
  • Building Secure Block Ciphers on Generic Attacks Assumptions
  • First Invited Talk
  • Lifting and Elliptic Curve Discrete Logarithms
  • Hash Functions I
  • Preimage Attacks on One-Block MD4, 63-Step MD5 and More
  • Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
  • Cryptanalysis of Tweaked Versions of SMASH and Reparation
  • Mathematical Aspects of Applied Cryptography I
  • Counting Functions for the k-Error Linear Complexity of 2 n -Periodic Binary Sequences
  • On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
  • Stream Ciphers Cryptanalysis
  • Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
  • A Cache Timing Analysis of HC-256
  • An Improved Fast Correlation Attack on Stream Ciphers
  • Hash Functions II
  • A Three-Property-Secure Hash Function
  • Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
  • A Scheme to Base a Hash Function on a Block Cipher
  • Collisions and Other Non-random Properties for Step-Reduced SHA-256
  • Cryptography with Algebraic Curves
  • Public Verifiability from Pairings in Secret Sharing Schemes
  • The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
  • Second Invited Talk - Stafford Tavares Lecture
  • The "Coefficients H" Technique
  • Mathematical Aspects of Applied Cryptography II
  • Distinguishing Multiplications from Squaring Operations
  • Subquadratic Polynomial Multiplication over GF(2 m ) Using Trinomial Bases and Chinese Remaindering
  • Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators
  • Curve-Based Primitives in Hardware
  • HECC Goes Embedded: An Area-Efficient Implementation of HECC
  • ECC Is Ready for RFID - A Proof in Silicon
  • Block Ciphers II
  • Cryptanalysis of a Generic Class of White-Box Implementations
  • New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
  • Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia.