Selected Areas in Cryptography

16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

  • Michael J. JacobsonJr.
  • Vincent Rijmen
  • Reihaneh Safavi-Naini
Conference proceedings SAC 2009

DOI: 10.1007/978-3-642-05445-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5867)

Table of contents (28 papers)

  1. Front Matter
  2. Hash Functions I

    1. Practical Collisions for SHAMATA-256
      Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer
      Pages 1-15
    2. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
      Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer
      Pages 16-35
  3. Miscellaneous Techniques

    1. More on Key Wrapping
      Rosario Gennaro, Shai Halevi
      Pages 53-70
    2. Information Theoretically Secure Multi Party Set Intersection Re-visited
      Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 71-91
    3. Real Traceable Signatures
      Sherman S. M. Chow
      Pages 92-107
  4. Hash Functions II

    1. Cryptanalysis of Hash Functions with Structures
      Dmitry Khovratovich
      Pages 108-125
    2. Cryptanalysis of the LANE Hash Function
      Shuang Wu, Dengguo Feng, Wenling Wu
      Pages 126-140
    3. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
      Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
      Pages 141-156
  5. Hardware Implementation and Cryptanalysis

    1. A More Compact AES
      David Canright, Dag Arne Osvik
      Pages 157-169
    2. Optimization Strategies for Hardware-Based Cofactorization
      Daniel Loebenberger, Jens Putzka
      Pages 170-181
    3. More on the Security of Linear RFID Authentication Protocols
      Matthias Krause, Dirk Stegemann
      Pages 182-196
    4. Differential Fault Analysis of Rabbit
      Aleksandar Kircanski, Amr M. Youssef
      Pages 197-214
  6. Block Ciphers

    1. Cryptanalysis of the Full MMB Block Cipher
      Meiqin Wang, Jorge Nakahara Jr., Yue Sun
      Pages 231-248
    2. Improved Integral Attacks on MISTY1
      Xiaorui Sun, Xuejia Lai
      Pages 266-280
    3. New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
      Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram
      Pages 281-294
  7. Modes of Operation

    1. Format-Preserving Encryption
      Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
      Pages 295-312

About these proceedings


This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009.

From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems.


AES DES Information LA MAC Permutation algorithms block ciphers calculus cryptography hash function hash functions privacy public key stream ciphers

Editors and affiliations

  • Michael J. JacobsonJr.
    • 1
  • Vincent Rijmen
    • 2
  • Reihaneh Safavi-Naini
    • 1
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.ESAT/COSICK.U. LeuvenLeuven-HeverleeBelgium

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-05443-3
  • Online ISBN 978-3-642-05445-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349