Selected Areas in Cryptography

10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers

Editors:

ISBN: 978-3-540-21370-3 (Print) 978-3-540-24654-1 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Elliptic and Hyperelliptic Curves

    1. No Access

      Book Chapter

      Pages 1-16

      Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves

    2. No Access

      Book Chapter

      Pages 17-25

      On the Selection of Pairing-Friendly Groups

    3. No Access

      Book Chapter

      Pages 26-41

      Counting Points for Hyperelliptic Curves of Type y 2=x 5+ax over Finite Prime Fields

  3. Side Channel Attacks

    1. No Access

      Book Chapter

      Pages 42-57

      Longer Keys May Facilitate Side Channel Attacks

    2. No Access

      Book Chapter

      Pages 58-72

      On Randomizing Private Keys to Counteract DPA Attacks

  4. Security Protocols and Applications

    1. No Access

      Book Chapter

      Pages 73-87

      Zero Common-Knowledge Authentication for Pervasive Networks

    2. No Access

      Book Chapter

      Pages 88-100

      Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks

    3. No Access

      Book Chapter

      Pages 101-116

      Broadcast Enforced Threshold Schemes with Disenrollment

  5. Cryptanalysis I

    1. No Access

      Book Chapter

      Pages 117-129

      A New Meet-in-the-Middle Attack on the IDEA Block Cipher

    2. No Access

      Book Chapter

      Pages 130-144

      Cryptanalysis of the Alleged SecurID Hash Function

    3. No Access

      Book Chapter

      Pages 145-159

      Authenticated On-Line Encryption

    4. No Access

      Book Chapter

      Pages 160-174

      Five Practical Attacks for “Optimistic Mixing for Exit-Polls”

  6. Cryptanalysis II

    1. No Access

      Book Chapter

      Pages 175-193

      Security Analysis of SHA-256 and Sisters

    2. No Access

      Book Chapter

      Pages 194-207

      A Chosen IV Attack Against Turing

    3. No Access

      Book Chapter

      Pages 208-221

      Related-Key Differential Cryptanalysis of 192-bit Key AES Variants

    4. No Access

      Book Chapter

      Pages 222-233

      A Distinguishing Attack of SNOW 2.0 with Linear Masking Method

  7. Cryptographic Primitives

    1. No Access

      Book Chapter

      Pages 234-247

      On the Use of GF-Inversion as a Cryptographic Primitive

    2. No Access

      Book Chapter

      Pages 248-261

      Cryptographic Applications of T-Functions

  8. Stream Ciphers

    1. No Access

      Book Chapter

      Pages 262-274

      On the Success of the Embedding Attack on the Alternating Step Generator

    2. No Access

      Book Chapter

      Pages 275-290

      Additive Autocorrelation of Resilient Boolean Functions

previous Page of 2