Online Library TheLib.net » Selected Areas in Cryptography: 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
cover of the book Selected Areas in Cryptography: 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers

Ebook: Selected Areas in Cryptography: 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers

00
27.01.2024
1
0

This volume constitutes the selected papers of the 15th Annual International Workshop on Selected Areas in Cryptography, SAC 2008, held in Sackeville, New Brunswick, Canada, in August 14-15, 2008.

From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: elliptic and hyperelliptic arithmetic, block ciphers, hash functions, mathematical aspects of applied cryptography, stream ciphers cryptanalysis, cryptography with algebraic curves, curve-based primitives in hardware.




This volume constitutes the selected papers of the 15th Annual International Workshop on Selected Areas in Cryptography, SAC 2008, held in Sackeville, New Brunswick, Canada, in August 14-15, 2008.

From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: elliptic and hyperelliptic arithmetic, block ciphers, hash functions, mathematical aspects of applied cryptography, stream ciphers cryptanalysis, cryptography with algebraic curves, curve-based primitives in hardware.


Content:
Front Matter....Pages -
Faster Halvings in Genus 2....Pages 1-17
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates....Pages 18-34
On Software Parallel Implementation of Cryptographic Pairings ....Pages 35-50
The Cryptanalysis of Reduced-Round SMS4....Pages 51-65
Building Secure Block Ciphers on Generic Attacks Assumptions....Pages 66-81
Lifting and Elliptic Curve Discrete Logarithms....Pages 82-102
Preimage Attacks on One-Block MD4, 63-Step MD5 and More....Pages 103-119
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5....Pages 120-135
Cryptanalysis of Tweaked Versions of SMASH and Reparation....Pages 136-150
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model....Pages 151-164
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers....Pages 165-183
A Cache Timing Analysis of HC-256....Pages 184-198
An Improved Fast Correlation Attack on Stream Ciphers....Pages 199-213
A Three-Property-Secure Hash Function....Pages 214-227
Analysis of the Collision Resistance of RadioGat?nUsing Algebraic Techniques....Pages 228-244
A Scheme to Base a Hash Function on a Block Cipher....Pages 245-261
Collisions and Other Non-random Properties for Step-Reduced SHA-256....Pages 262-275
Public Verifiability from Pairings in Secret Sharing Schemes....Pages 276-293
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences....Pages 294-308
The “Coefficients H” Technique....Pages 309-327
Distinguishing Multiplications from Squaring Operations....Pages 328-345
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators....Pages 346-360
HECC Goes Embedded: An Area-Efficient Implementation of HECC....Pages 361-372
ECC Is Ready for RFID – A Proof in Silicon....Pages 373-386
Cryptanalysis of a Generic Class of White-Box Implementations....Pages 387-400
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256....Pages 401-413
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia....Pages 414-428
Back Matter....Pages 429-441
....Pages 442-456
Download the book Selected Areas in Cryptography: 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen