Selected Areas in Cryptography

14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

Editors:

ISBN: 978-3-540-77359-7 (Print) 978-3-540-77360-3 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-16

    Reduced Complexity Attacks on the Alternating Step Generator

  3. No Access

    Book Chapter

    Pages 17-35

    Extended BDD-Based Cryptanalysis of Keystream Generators

  4. No Access

    Book Chapter

    Pages 36-55

    Two Trivial Attacks on Trivium

  5. No Access

    Book Chapter

    Pages 56-73

    Collisions for 70-Step SHA-1: On the Full Cost of Collision Search

  6. No Access

    Book Chapter

    Pages 74-83

    Cryptanalysis of the CRUSH Hash Function

  7. No Access

    Book Chapter

    Pages 84-95

    Improved Side-Channel Collision Attacks on AES

  8. No Access

    Book Chapter

    Pages 96-109

    Analysis of Countermeasures Against Access Driven Cache Attacks on AES

  9. No Access

    Book Chapter

    Pages 110-125

    Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms

  10. No Access

    Book Chapter

    Pages 126-137

    Koblitz Curves and Integer Equivalents of Frobenius Expansions

  11. No Access

    Book Chapter

    Pages 138-154

    Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic

  12. No Access

    Book Chapter

    Pages 155-172

    Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations

  13. No Access

    Book Chapter

    Pages 173-183

    Explicit Formulas for Efficient Multiplication in $\mathbb{F}_{3^{6m}}$

  14. No Access

    Book Chapter

    Pages 184-211

    Linear Cryptanalysis of Non Binary Ciphers

  15. No Access

    Book Chapter

    Pages 212-231

    The Delicate Issues of Addition with Respect to XOR Differences

  16. No Access

    Book Chapter

    Pages 232-245

    MRHS Equation Systems

  17. No Access

    Book Chapter

    Pages 246-263

    A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software

  18. No Access

    Book Chapter

    Pages 264-277

    Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings

  19. No Access

    Book Chapter

    Pages 278-295

    Cryptanalysis of White Box DES Implementations

  20. No Access

    Book Chapter

    Pages 296-310

    Attacks on the ESA-PSS-04-151 MAC Scheme

  21. No Access

    Book Chapter

    Pages 311-327

    The Security of the Extended Codebook (XCB) Mode of Operation

previous Page of 2