Selected Areas in Cryptography

19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-35998-9 (Print) 978-3-642-35999-6 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-15

      An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

    2. No Access

      Book Chapter

      Pages 16-33

      A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery

    3. No Access

      Book Chapter

      Pages 34-49

      Cryptanalysis of the Xiao – Lai White-Box AES Implementation

  3. Digital Signatures

    1. No Access

      Book Chapter

      Pages 50-65

      A Practical Leakage-Resilient Signature Scheme in the Generic Group Model

    2. No Access

      Book Chapter

      Pages 66-80

      Forward Secure Signatures on Smart Cards

  4. The Stafford Tavares Lecture

    1. No Access

      Book Chapter

      Pages 81-85

      Extracts from the SHA-3 Competition

  5. Stream Ciphers

    1. No Access

      Book Chapter

      Pages 86-103

      Cryptanalysis of the “Kindle” Cipher

    2. No Access

      Book Chapter

      Pages 104-118

      Cryptographically Strong de Bruijn Sequences with Large Periods

    3. No Access

      Book Chapter

      Pages 119-134

      Cryptanalysis of the Loiss Stream Cipher

  6. Implementations

    1. No Access

      Book Chapter

      Pages 135-148

      Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three

    2. No Access

      Book Chapter

      Pages 149-165

      Efficient Implementation of Bilinear Pairings on ARM Processors

    3. No Access

      Book Chapter

      Pages 166-183

      Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$

    4. No Access

      Book Chapter

      Pages 184-201

      Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers

  7. Block Cipher Cryptanalysis

    1. No Access

      Book Chapter

      Pages 202-221

      All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach

    2. No Access

      Book Chapter

      Pages 222-233

      Improved Cryptanalysis of the Block Cipher KASUMI

    3. No Access

      Book Chapter

      Pages 234-251

      Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers

  8. Lattices

    1. No Access

      Book Chapter

      Pages 252-274

      Attacking (EC)DSA Given Only an Implicit Hint

    2. No Access

      Book Chapter

      Pages 275-286

      Lattice Reduction for Modular Knapsack

  9. Hash Functions

    1. No Access

      Book Chapter

      Pages 287-303

      The Boomerang Attacks on the Round-Reduced Skein-512

    2. No Access

      Book Chapter

      Pages 304-320

      Boomerang and Slide-Rotational Analysis of the SM3 Hash Function

previous Page of 2