Selected Areas in Cryptography

14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

  • Editors
  • Carlisle Adams
  • Ali Miri
  • Michael Wiener
Conference proceedings SAC 2007

DOI: 10.1007/978-3-540-77360-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4876)

Table of contents (25 papers)

  1. Front Matter
  2. Reduced Complexity Attacks on the Alternating Step Generator
    Shahram Khazaei, Simon Fischer, Willi Meier
    Pages 1-16
  3. Two Trivial Attacks on Trivium
    Alexander Maximov, Alex Biryukov
    Pages 36-55
  4. Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
    Christophe De Cannière, Florian Mendel, Christian Rechberger
    Pages 56-73
  5. Cryptanalysis of the CRUSH Hash Function
    Matt Henricksen, Lars R. Knudsen
    Pages 74-83
  6. Analysis of Countermeasures Against Access Driven Cache Attacks on AES
    Johannes Blömer, Volker Krummel
    Pages 96-109
  7. Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
    Frederic Amiel, Benoit Feix, Karine Villegas
    Pages 110-125
  8. Koblitz Curves and Integer Equivalents of Frobenius Expansions
    Billy Bob Brumley, Kimmo Järvinen
    Pages 126-137
  9. Explicit Formulas for Efficient Multiplication in \(\mathbb{F}_{3^{6m}}\)
    Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi
    Pages 173-183
  10. Linear Cryptanalysis of Non Binary Ciphers
    Thomas Baignères, Jacques Stern, Serge Vaudenay
    Pages 184-211
  11. The Delicate Issues of Addition with Respect to XOR Differences
    Gaoli Wang, Nathan Keller, Orr Dunkelman
    Pages 212-231
  12. MRHS Equation Systems
    Håvard Raddum
    Pages 232-245
  13. A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software
    Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita
    Pages 246-263
  14. Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
    Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
    Pages 264-277
  15. Cryptanalysis of White Box DES Implementations
    Louis Goubin, Jean-Michel Masereel, Michaël Quisquater
    Pages 278-295
  16. Attacks on the ESA-PSS-04-151 MAC Scheme
    Georg Illies, Marian Margraf
    Pages 296-310

About these proceedings

Introduction

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen’s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can present and discuss new work on selected areas of current interest. The themes for SAC 2007 were: – Design and analysis of symmetric key cryptosystems – Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms – E?cient implementations of symmetric and public key algorithms – Innovative cryptographic defenses against malicious software A total of 73 papers were submitted to SAC 2007. Of these, one was wi- drawn by the authors, and 25 were accepted by the Program Committee for presentation at the workshop. In addition to these presentations, we were for- nate to have two invited speakers: – Dan Bernstein: “Edwards Coordinates for Elliptic Curves” – MotiYung:“CryptographyandVirologyInter-Relationships. ”Thistalkwas designated the Sta?ord Tavares Lecture. We are grateful to the Program Committee and the many external reviewers for their hard work and expertise in selecting the program.

Keywords

AES Code Message Authentication Code Public Key access control algorithm algorithms authentication block ciphers cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77359-7
  • Online ISBN 978-3-540-77360-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349