Selected Areas in Cryptography

18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers

  • Ali Miri
  • Serge Vaudenay
Conference proceedings SAC 2011

DOI: 10.1007/978-3-642-28496-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7118)

Table of contents (25 papers)

  1. Front Matter
  2. Selected Areas in Cryptography 2011

    1. Cryptanalysis of Hash Functions

      1. Improved Analysis of ECHO-256
        Jérémy Jean, María Naya-Plasencia, Martin Schläffer
        Pages 19-36
      2. Provable Chosen-Target-Forced-Midfix Preimage Resistance
        Elena Andreeva, Bart Mennink
        Pages 37-54
    2. Security in Clouds

      1. On CCA-Secure Somewhat Homomorphic Encryption
        Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren
        Pages 55-72
    3. Invited Paper I

      1. Group Law Computations on Jacobians of Hyperelliptic Curves
        Craig Costello, Kristin Lauter
        Pages 92-117
    4. Bits and Randomness

      1. Cryptographic Analysis of All 4 × 4-Bit S-Boxes
        Markku-Juhani O. Saarinen
        Pages 118-133
      2. The Cryptographic Power of Random Selection
        Matthias Krause, Matthias Hamann
        Pages 134-150
      3. Proof of Empirical RC4 Biases and New Key Correlations
        Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
        Pages 151-168
    5. Cryptanalysis of Ciphers I

      1. Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
        Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmancı
        Pages 169-184
      2. Practical Attack on the Full MMB Block Cipher
        Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
        Pages 185-199
      3. Conditional Differential Cryptanalysis of Trivium and KATAN
        Simon Knellwolf, Willi Meier, María Naya-Plasencia
        Pages 200-212
    6. Cryptanalysis of Ciphers II

      1. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
        Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau
        Pages 230-242
      2. New Insights on Impossible Differential Cryptanalysis
        Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent
        Pages 243-259
    7. Cryptanalysis of Public-Key Cryptography

      1. A Unified Framework for Small Secret Exponent Attack on RSA
        Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
        Pages 260-277
    8. Cipher Implementation

      1. Very Compact Hardware Implementations of the Blockcipher CLEFIA
        Toru Akishita, Harunaga Hiwatari
        Pages 278-292
    9. Invited Paper II

      1. Another Look at Tightness
        Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
        Pages 293-319
    10. New Designs

      1. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
        Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
        Pages 320-337

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011.

The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Keywords

RSA authenticated encryption hyperelliptic curves key-recovery message authentication

Editors and affiliations

  • Ali Miri
    • 1
  • Serge Vaudenay
    • 2
  1. 1.Department of Computer ScienceRyerson UniversityTorontoCanada
  2. 2.Ecole Polytechnique Fédérale de LausanneLausanneSwitzerland

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28495-3
  • Online ISBN 978-3-642-28496-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349