Selected Areas in Cryptography

14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

  • Editors
  • Carlisle Adams
  • Ali Miri
  • Michael Wiener
Conference proceedings SAC 2007
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4876)

Table of contents

  1. Front Matter
  2. Shahram Khazaei, Simon Fischer, Willi Meier
    Pages 1-16
  3. Alexander Maximov, Alex Biryukov
    Pages 36-55
  4. Christophe De Cannière, Florian Mendel, Christian Rechberger
    Pages 56-73
  5. Matt Henricksen, Lars R. Knudsen
    Pages 74-83
  6. Johannes Blömer, Volker Krummel
    Pages 96-109
  7. Frederic Amiel, Benoit Feix, Karine Villegas
    Pages 110-125
  8. Billy Bob Brumley, Kimmo Järvinen
    Pages 126-137
  9. Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi
    Pages 173-183
  10. Thomas Baignères, Jacques Stern, Serge Vaudenay
    Pages 184-211
  11. Gaoli Wang, Nathan Keller, Orr Dunkelman
    Pages 212-231
  12. Håvard Raddum
    Pages 232-245
  13. Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita
    Pages 246-263
  14. Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
    Pages 264-277
  15. Louis Goubin, Jean-Michel Masereel, Michaël Quisquater
    Pages 278-295
  16. Georg Illies, Marian Margraf
    Pages 296-310

About these proceedings

Introduction

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen’s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can present and discuss new work on selected areas of current interest. The themes for SAC 2007 were: – Design and analysis of symmetric key cryptosystems – Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms – E?cient implementations of symmetric and public key algorithms – Innovative cryptographic defenses against malicious software A total of 73 papers were submitted to SAC 2007. Of these, one was wi- drawn by the authors, and 25 were accepted by the Program Committee for presentation at the workshop. In addition to these presentations, we were for- nate to have two invited speakers: – Dan Bernstein: “Edwards Coordinates for Elliptic Curves” – MotiYung:“CryptographyandVirologyInter-Relationships. ”Thistalkwas designated the Sta?ord Tavares Lecture. We are grateful to the Program Committee and the many external reviewers for their hard work and expertise in selecting the program.

Keywords

AES Code Message Authentication Code Public Key access control algorithm algorithms authentication block ciphers cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-77360-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77359-7
  • Online ISBN 978-3-540-77360-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349