Book Volume 6544 2011

Selected Areas in Cryptography

17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers


ISBN: 978-3-642-19573-0 (Print) 978-3-642-19574-7 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hash Functions I

    1. Chapter

      Pages 1-17

      Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256

    2. Chapter

      Pages 18-35

      Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512

    3. Chapter

      Pages 36-56

      The Differential Analysis of S-Functions

  3. Stream Ciphers

    1. Chapter

      Pages 57-73

      Hill Climbing Algorithms and Trivium

    2. Chapter

      Pages 74-91

      Discovery and Exploitation of New Biases in RC4

  4. The Stafford Tavares Lecture

    1. Chapter

      Pages 92-98

      The Rise and Fall and Rise of Combinatorial Key Predistribution

  5. Efficient Implementations

    1. Chapter

      Pages 99-113

      A Low-Area Yet Performant FPGA Implementation of Shabal

    2. Chapter

      Pages 114-129

      Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags

    3. Chapter

      Pages 130-142

      Batch Computations Revisited: Combining Key Computations and Batch Verifications

  6. Coding and Combinatorics

    1. Chapter

      Pages 143-158

      Wild McEliece

    2. Chapter

      Pages 159-170


    3. Chapter

      Pages 171-186

      A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem

    4. Chapter

      Pages 187-197

      Optimal Covering Codes for Finding Near-Collisions

  7. Block Ciphers

    1. Chapter

      Pages 198-210

      Tweaking AES

    2. Chapter

      Pages 211-228

      On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis

    3. Chapter

      Pages 229-240

      A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

  8. Side Channel Attacks

    1. Chapter

      Pages 241-261

      Improving DPA by Peak Distribution Analysis

    2. Chapter

      Pages 262-280

      Affine Masking against Higher-Order Side Channel Analysis

  9. Invited Talk

    1. Chapter

      Pages 281-281

      Search on Encrypted Data in the Symmetric-Key Setting

  10. Mathematical Aspects

    1. Chapter

      Pages 282-301

      Preimages for the Tillich-Zémor Hash Function

previous Page of 2