Selected Areas in Cryptography -- SAC 2013

20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers

Editors:

ISBN: 978-3-662-43413-0 (Print) 978-3-662-43414-7 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XV

  2. Invited Talk

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-25

      The Realm of the Pairings

  3. Lattices Part I

    1. Front Matter

      Pages 27-27

    2. No Access

      Book Chapter

      Pages 29-47

      A Three-Level Sieve Algorithm for the Shortest Vector Problem

    3. No Access

      Book Chapter

      Pages 48-67

      Improvement and Efficient Implementation of a Lattice-Based Signature Scheme

    4. No Access

      Book Chapter

      Pages 68-85

      Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware

  4. Invited Talk

    1. Front Matter

      Pages 87-87

    2. No Access

      Book Chapter

      Pages 89-117

      Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes

  5. Discrete Logarithms

    1. Front Matter

      Pages 119-119

    2. No Access

      Book Chapter

      Pages 121-135

      A Group Action on \({\mathbb Z}_p^{\times }\) and the Generalized DLP with Auxiliary Inputs

    3. No Access

      Book Chapter

      Pages 136-152

      Solving a \(6120\) -bit DLP on a Desktop Computer

  6. Stream Ciphers and Authenticated Encryption

    1. Front Matter

      Pages 153-153

    2. No Access

      Book Chapter

      Pages 155-173

      How to Recover Any Byte of Plaintext on RC4

    3. No Access

      Book Chapter

      Pages 174-184

      The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

    4. No Access

      Book Chapter

      Pages 185-201

      AEGIS: A Fast Authenticated Encryption Algorithm

  7. Post--quantum (Hash-Based and System Solving)

    1. Front Matter

      Pages 203-203

    2. No Access

      Book Chapter

      Pages 205-222

      Fast Exhaustive Search for Quadratic Systems in \(\mathbb {F}_{2}\) on FPGAs

    3. No Access

      Book Chapter

      Pages 223-243

      Faster Hash-Based Signatures with Bounded Leakage

  8. White Box Crypto

    1. Front Matter

      Pages 245-245

    2. No Access

      Book Chapter

      Pages 247-264

      White-Box Security Notions for Symmetric Encryption Schemes

    3. No Access

      Book Chapter

      Pages 265-285

      Two Attacks on a White-Box AES Implementation

  9. Block Ciphers

    1. Front Matter

      Pages 287-287

    2. No Access

      Book Chapter

      Pages 289-305

      Extended Generalized Feistel Networks Using Matrix Representation

    3. No Access

      Book Chapter

      Pages 306-323

      Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA

    4. No Access

      Book Chapter

      Pages 324-351

      Implementing Lightweight Block Ciphers on x86 Architectures

  10. Invited Talk

    1. Front Matter

      Pages 353-353

    2. No Access

      Book Chapter

      Pages 355-379

      A New Index Calculus Algorithm with Complexity \(L(1/4+o(1))\) in Small Characteristic

  11. Lattices Part II

    1. Front Matter

      Pages 381-381

    2. No Access

      Book Chapter

      Pages 383-401

      High Precision Discrete Gaussian Sampling on FPGAs

    3. No Access

      Book Chapter

      Pages 402-417

      Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers

previous Page of 2