Selected Areas in Cryptography

17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers

  • Alex Biryukov
  • Guang Gong
  • Douglas R. Stinson
Conference proceedings SAC 2010

DOI: 10.1007/978-3-642-19574-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6544)

Table of contents (26 papers)

  1. Front Matter
  2. Hash Functions I

    1. Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512
      Charles Bouillaguet, Orr Dunkelman, Gaëan Leurent, Pierre-Alain Fouque
      Pages 18-35
    2. The Differential Analysis of S-Functions
      Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel
      Pages 36-56
  3. Stream Ciphers

    1. Hill Climbing Algorithms and Trivium
      Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz
      Pages 57-73
    2. Discovery and Exploitation of New Biases in RC4
      Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux
      Pages 74-91
  4. The Stafford Tavares Lecture

  5. Efficient Implementations

  6. Coding and Combinatorics

    1. Wild McEliece
      Daniel J. Bernstein, Tanja Lange, Christiane Peters
      Pages 143-158
    2. Parallel-CFS
      Matthieu Finiasz
      Pages 159-170
    3. A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem
      Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui
      Pages 171-186
    4. Optimal Covering Codes for Finding Near-Collisions
      Mario Lamberger, Vincent Rijmen
      Pages 187-197
  7. Block Ciphers

  8. Side Channel Attacks

    1. Improving DPA by Peak Distribution Analysis
      Jing Pan, Jasper G. J. van Woudenberg, Jerry I. den Hartog, Marc F. Witteman
      Pages 241-261
    2. Affine Masking against Higher-Order Side Channel Analysis
      Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
      Pages 262-280
  9. Invited Talk

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.

Keywords

FPGA implementation cryptanalysis cryptographic attacks public-key cryptography symmetric cryptography

Editors and affiliations

  • Alex Biryukov
    • 1
  • Guang Gong
    • 2
  • Douglas R. Stinson
    • 3
  1. 1.University of LuxembourgLuxembourg
  2. 2.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  3. 3.David R. Cheriton School of Computer ScienceUniversity of WaterlooWaterlooCanada

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19573-0
  • Online ISBN 978-3-642-19574-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349