Selected Areas in Cryptography 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the fol...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5867 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Hash Functions I
- Practical Collisions for SHAMATA-256
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function
- Miscellaneous Techniques
- More on Key Wrapping
- Information Theoretically Secure Multi Party Set Intersection Re-visited
- Real Traceable Signatures
- Hash Functions II
- Cryptanalysis of Hash Functions with Structures
- Cryptanalysis of the LANE Hash Function
- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
- Hardware Implementation and Cryptanalysis
- A More Compact AES
- Optimization Strategies for Hardware-Based Cofactorization
- More on the Security of Linear RFID Authentication Protocols
- Differential Fault Analysis of Rabbit
- An Improved Recovery Algorithm for Decayed AES Key Schedule Images
- Block Ciphers
- Cryptanalysis of the Full MMB Block Cipher
- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis
- Improved Integral Attacks on MISTY1
- New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128
- Modes of Operation
- Format-Preserving Encryption
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- Implementation of Public Key Cryptography
- On Repeated Squarings in Binary Fields
- Highly Regular m-Ary Powering Ladders
- An Efficient Residue Group Multiplication for the ? T Pairing over
- Compact McEliece Keys from Goppa Codes
- Hash Functions and Stream Ciphers
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
- Cryptanalysis of Dynamic SHA(2)
- A New Approach for FCSRs
- New Cryptanalysis of Irregularly Decimated Stream Ciphers.