Skip to main content
  • Conference proceedings
  • © 2012

Selected Areas in Cryptography

18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7118)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Selected Areas in Cryptography 2011

    1. Cryptanalysis of Hash Functions

      1. Improved Analysis of ECHO -256
        • Jérémy Jean, María Naya-Plasencia, Martin Schläffer
        Pages 19-36
      2. Provable Chosen-Target-Forced-Midfix Preimage Resistance
        • Elena Andreeva, Bart Mennink
        Pages 37-54
    2. Security in Clouds

      1. On CCA-Secure Somewhat Homomorphic Encryption
        • Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren
        Pages 55-72
    3. Invited Paper I

      1. Group Law Computations on Jacobians of Hyperelliptic Curves
        • Craig Costello, Kristin Lauter
        Pages 92-117
    4. Bits and Randomness

      1. Cryptographic Analysis of All 4 × 4-Bit S-Boxes
        • Markku-Juhani O. Saarinen
        Pages 118-133
      2. The Cryptographic Power of Random Selection
        • Matthias Krause, Matthias Hamann
        Pages 134-150
      3. Proof of Empirical RC4 Biases and New Key Correlations
        • Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
        Pages 151-168
    5. Cryptanalysis of Ciphers I

      1. Practical Attack on the Full MMB Block Cipher
        • Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
        Pages 185-199
      2. Conditional Differential Cryptanalysis of Trivium and KATAN
        • Simon Knellwolf, Willi Meier, María Naya-Plasencia
        Pages 200-212
    6. Cryptanalysis of Ciphers II

      1. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
        • Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau
        Pages 230-242
      2. New Insights on Impossible Differential Cryptanalysis
        • Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent
        Pages 243-259
    7. Cryptanalysis of Public-Key Cryptography

      1. A Unified Framework for Small Secret Exponent Attack on RSA
        • Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
        Pages 260-277
    8. Cipher Implementation

      1. Very Compact Hardware Implementations of the Blockcipher CLEFIA
        • Toru Akishita, Harunaga Hiwatari
        Pages 278-292
    9. Invited Paper II

      1. Another Look at Tightness
        • Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
        Pages 293-319
    10. New Designs

      1. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
        • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
        Pages 320-337

Other Volumes

  1. Selected Areas in Cryptography

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Editors and Affiliations

  • Department of Computer Science, Ryerson University, Toronto, Canada

    Ali Miri

  • Ecole Polytechnique Fédérale de Lausanne, Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access