Selected Areas in Cryptography

11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers

Editors:

ISBN: 978-3-540-24327-4 (Print) 978-3-540-30564-4 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Stream Cipher Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-18

      An Improved Correlation Attack on A5/1

    2. No Access

      Book Chapter

      Pages 19-38

      Extending the Resynchronization Attack

    3. No Access

      Book Chapter

      Pages 39-53

      A New Simple Technique to Attack Filter Generators and Related Ciphers

  3. Side-Channel Analysis

    1. No Access

      Book Chapter

      Pages 54-68

      On XTR and Side-Channel Analysis

    2. No Access

      Book Chapter

      Pages 69-83

      Provably Secure Masking of AES

  4. Block Cipher Design

    1. No Access

      Book Chapter

      Pages 84-99

      Perfect Diffusion Primitives for Block Ciphers

    2. No Access

      Book Chapter

      Pages 100-113

      Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results

    3. No Access

      Book Chapter

      Pages 114-129

      FOX : A New Family of Block Ciphers

  5. Efficient Implementations

    1. No Access

      Book Chapter

      Pages 130-143

      A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue

    2. No Access

      Book Chapter

      Pages 144-158

      Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity

    3. No Access

      Book Chapter

      Pages 159-169

      Modular Number Systems: Beyond the Mersenne Family

    4. No Access

      Book Chapter

      Pages 170-181

      Efficient Doubling on Genus Two Curves over Binary Fields

  6. Secret Key Cryptography I

    1. No Access

      Book Chapter

      Pages 182-197

      About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)

    2. No Access

      Book Chapter

      Pages 198-211

      A Subliminal Channel in Secret Block Ciphers

    3. No Access

      Book Chapter

      Pages 212-226

      Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes

  7. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 227-240

      Cryptanalysis of a White Box AES Implementation

    2. No Access

      Book Chapter

      Pages 241-251

      Predicting Subset Sum Pseudorandom Generators

    3. No Access

      Book Chapter

      Pages 252-266

      Collision Attack and Pseudorandomness of Reduced-Round Camellia

  8. Cryptographic Protocols

    1. No Access

      Book Chapter

      Pages 267-279

      Password Based Key Exchange with Mutual Authentication

    2. No Access

      Book Chapter

      Pages 280-293

      Product Construction of Key Distribution Schemes for Sensor Networks

previous Page of 2