Selected Areas in Cryptography

16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

ISBN: 978-3-642-05443-3 (Print) 978-3-642-05445-7 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hash Functions I

    1. No Access

      Book Chapter

      Pages 1-15

      Practical Collisions for SHAMATA-256

    2. No Access

      Book Chapter

      Pages 16-35

      Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

    3. No Access

      Book Chapter

      Pages 36-52

      Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function

  3. Miscellaneous Techniques

    1. No Access

      Book Chapter

      Pages 53-70

      More on Key Wrapping

    2. No Access

      Book Chapter

      Pages 71-91

      Information Theoretically Secure Multi Party Set Intersection Re-visited

    3. No Access

      Book Chapter

      Pages 92-107

      Real Traceable Signatures

  4. Hash Functions II

    1. No Access

      Book Chapter

      Pages 108-125

      Cryptanalysis of Hash Functions with Structures

    2. No Access

      Book Chapter

      Pages 126-140

      Cryptanalysis of the LANE Hash Function

    3. No Access

      Book Chapter

      Pages 141-156

      Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

  5. Hardware Implementation and Cryptanalysis

    1. No Access

      Book Chapter

      Pages 157-169

      A More Compact AES

    2. No Access

      Book Chapter

      Pages 170-181

      Optimization Strategies for Hardware-Based Cofactorization

    3. No Access

      Book Chapter

      Pages 182-196

      More on the Security of Linear RFID Authentication Protocols

    4. No Access

      Book Chapter

      Pages 197-214

      Differential Fault Analysis of Rabbit

    5. No Access

      Book Chapter

      Pages 215-230

      An Improved Recovery Algorithm for Decayed AES Key Schedule Images

  6. Block Ciphers

    1. No Access

      Book Chapter

      Pages 231-248

      Cryptanalysis of the Full MMB Block Cipher

    2. No Access

      Book Chapter

      Pages 249-265

      Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis

    3. No Access

      Book Chapter

      Pages 266-280

      Improved Integral Attacks on MISTY1

    4. No Access

      Book Chapter

      Pages 281-294

      New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128

  7. Modes of Operation

    1. No Access

      Book Chapter

      Pages 295-312

      Format-Preserving Encryption

    2. No Access

      Book Chapter

      Pages 313-330

      BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption

previous Page of 2