Book Volume 3897 2006

Selected Areas in Cryptography

12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers


ISBN: 978-3-540-33108-7 (Print) 978-3-540-33109-4 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Stream Ciphers I

    1. Chapter

      Pages 1-19

      Conditional Estimators: An Effective Attack on A5/1

    2. Chapter

      Pages 20-35

      Cryptanalysis of the F-FCSR Stream Cipher Family

    3. Chapter

      Pages 36-50

      Fault Attacks on Combiners with Memory

  3. Block Ciphers

    1. Chapter

      Pages 51-64

      New Observation on Camellia

    2. Chapter

      Pages 65-81

      Proving the Security of AES Substitution-Permutation Network

  4. Modes of Operation

    1. Chapter

      Pages 82-94

      An Attack on CFB Mode Encryption as Used by OpenPGP

    2. Chapter

      Pages 95-109

      Parallelizable Authentication Trees

    3. Chapter

      Pages 110-127

      Improved Time-Memory Trade-Offs with Multiple Data

  5. Public Key Cryptography

    1. Chapter

      Pages 128-143

      A Space Efficient Backdoor in RSA and Its Applications

    2. Chapter

      Pages 144-158

      An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism

  6. Stream Ciphers II

    1. Chapter

      Pages 159-174

      On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners

    2. Chapter

      Pages 175-188

      Rekeying Issues in the MUGI Stream Cipher

  7. Key Establishment Protocols and Access Control

    1. Chapter

      Pages 189-204

      Tree-Based Key Distribution Patterns

    2. Chapter

      Pages 205-220

      Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves

    3. Chapter

      Pages 221-232

      An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security

  8. Hash Functions

    1. Chapter

      Pages 233-244

      Breaking a New Hash Function Design Strategy Called SMASH

    2. Chapter

      Pages 245-260

      Analysis of a SHA-256 Variant

    3. Chapter

      Pages 261-275

      Impact of Rotations in SHA-1 and Related Hash Functions

  9. Protocols for RFID Tags

    1. Chapter

      Pages 276-290

      A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags

    2. Chapter

      Pages 291-306

      Reducing Time Complexity in RFID Systems

previous Page of 2