Selected Areas in Cryptography

15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers

Editors:

ISBN: 978-3-642-04158-7 (Print) 978-3-642-04159-4 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Elliptic and Hyperelliptic Curve Arithmetic

    1. No Access

      Book Chapter

      Pages 1-17

      Faster Halvings in Genus 2

    2. No Access

      Book Chapter

      Pages 18-34

      Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates

    3. No Access

      Book Chapter

      Pages 35-50

      On Software Parallel Implementation of Cryptographic Pairings

  3. Block Ciphers I

    1. No Access

      Book Chapter

      Pages 51-65

      The Cryptanalysis of Reduced-Round SMS4

    2. No Access

      Book Chapter

      Pages 66-81

      Building Secure Block Ciphers on Generic Attacks Assumptions

  4. First Invited Talk

    1. No Access

      Book Chapter

      Pages 82-102

      Lifting and Elliptic Curve Discrete Logarithms

  5. Hash Functions I

    1. No Access

      Book Chapter

      Pages 103-119

      Preimage Attacks on One-Block MD4, 63-Step MD5 and More

    2. No Access

      Book Chapter

      Pages 120-135

      Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5

    3. No Access

      Book Chapter

      Pages 136-150

      Cryptanalysis of Tweaked Versions of SMASH and Reparation

  6. Mathematical Aspects of Applied Cryptography I

    1. No Access

      Book Chapter

      Pages 151-164

      Counting Functions for the k-Error Linear Complexity of 2 n -Periodic Binary Sequences

    2. No Access

      Book Chapter

      Pages 165-183

      On the Exact Success Rate of Side Channel Analysis in the Gaussian Model

  7. Stream Ciphers Cryptanalysis

    1. No Access

      Book Chapter

      Pages 184-198

      Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers

    2. No Access

      Book Chapter

      Pages 199-213

      A Cache Timing Analysis of HC-256

    3. No Access

      Book Chapter

      Pages 214-227

      An Improved Fast Correlation Attack on Stream Ciphers

  8. Hash Functions II

    1. No Access

      Book Chapter

      Pages 228-244

      A Three-Property-Secure Hash Function

    2. No Access

      Book Chapter

      Pages 245-261

      Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques

    3. No Access

      Book Chapter

      Pages 262-275

      A Scheme to Base a Hash Function on a Block Cipher

    4. No Access

      Book Chapter

      Pages 276-293

      Collisions and Other Non-random Properties for Step-Reduced SHA-256

  9. Cryptography with Algebraic Curves

    1. No Access

      Book Chapter

      Pages 294-308

      Public Verifiability from Pairings in Secret Sharing Schemes

    2. No Access

      Book Chapter

      Pages 309-327

      The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences

previous Page of 2