Cargando…

Selected Areas in Cryptography 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the fol...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jacobson, Michael J. (Editor ), Rijmen, Vincent (Editor ), Safavi-Naini, Rei (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5867
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Hash Functions I
  • Practical Collisions for SHAMATA-256
  • Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
  • Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function
  • Miscellaneous Techniques
  • More on Key Wrapping
  • Information Theoretically Secure Multi Party Set Intersection Re-visited
  • Real Traceable Signatures
  • Hash Functions II
  • Cryptanalysis of Hash Functions with Structures
  • Cryptanalysis of the LANE Hash Function
  • Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
  • Hardware Implementation and Cryptanalysis
  • A More Compact AES
  • Optimization Strategies for Hardware-Based Cofactorization
  • More on the Security of Linear RFID Authentication Protocols
  • Differential Fault Analysis of Rabbit
  • An Improved Recovery Algorithm for Decayed AES Key Schedule Images
  • Block Ciphers
  • Cryptanalysis of the Full MMB Block Cipher
  • Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis
  • Improved Integral Attacks on MISTY1
  • New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128
  • Modes of Operation
  • Format-Preserving Encryption
  • BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
  • Implementation of Public Key Cryptography
  • On Repeated Squarings in Binary Fields
  • Highly Regular m-Ary Powering Ladders
  • An Efficient Residue Group Multiplication for the ? T Pairing over
  • Compact McEliece Keys from Goppa Codes
  • Hash Functions and Stream Ciphers
  • Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
  • Cryptanalysis of Dynamic SHA(2)
  • A New Approach for FCSRs
  • New Cryptanalysis of Irregularly Decimated Stream Ciphers.