Selected Areas in Cryptography

13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

Editors:

ISBN: 978-3-540-74461-0 (Print) 978-3-540-74462-7 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Block Cipher Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-14

      Improved DST Cryptanalysis of IDEA

    2. No Access

      Book Chapter

      Pages 15-27

      Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192

    3. No Access

      Book Chapter

      Pages 28-44

      Related-Key Rectangle Attack on the Full SHACAL-1

  3. Stream Cipher Cryptanalysis I

    1. No Access

      Book Chapter

      Pages 45-55

      Cryptanalysis of Achterbahn-Version 2

    2. No Access

      Book Chapter

      Pages 56-66

      Cryptanalysis of the Stream Cipher ABC v2

    3. Block and Stream Ciphers

      1. No Access

        Book Chapter

        Pages 67-75

        The Design of a Stream Cipher LEX

      2. No Access

        Book Chapter

        Pages 76-95

        Dial C for Cipher

      3. No Access

        Book Chapter

        Pages 96-113

        Improved Security Analysis of XEX and LRW Modes

      Side-Channel Attacks

      1. No Access

        Book Chapter

        Pages 114-133

        Extended Hidden Number Problem and Its Cryptanalytic Applications

      2. No Access

        Book Chapter

        Pages 134-146

        Changing the Odds Against Masked Logic

      3. No Access

        Book Chapter

        Pages 147-162

        Advances on Access-Driven Cache Attacks on AES

      4. No Access

        Book Chapter

        Pages 163-173

        Blind Differential Cryptanalysis for Enhanced Power Attacks

  4. Efficient Implementations I

    1. No Access

      Book Chapter

      Pages 174-187

      Efficient Implementations of Multivariate Quadratic Systems

    2. No Access

      Book Chapter

      Pages 188-202

      Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication

    3. No Access

      Book Chapter

      Pages 203-219

      Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems

  5. Stream Cipher Cryptanalysis II

    1. No Access

      Book Chapter

      Pages 220-233

      On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2

    2. No Access

      Book Chapter

      Pages 234-248

      Multi-pass Fast Correlation Attack on Stream Ciphers

    3. No Access

      Book Chapter

      Pages 249-265

      Crossword Puzzle Attack on NLS

  6. Invited Talk

    1. No Access

      Book Chapter

      Pages 266-284

      When Stream Cipher Analysis Meets Public-Key Cryptography

  7. Efficient Implementations II

    1. No Access

      Book Chapter

      Pages 285-301

      On Redundant τ-Adic Expansions and Non-adjacent Digit Sets

previous Page of 2