Selected Areas in Cryptography

16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

  • Michael J. JacobsonJr.
  • Vincent Rijmen
  • Reihaneh Safavi-Naini
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5867)

Table of contents

  1. Front Matter
  2. Hash Functions I

    1. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer
      Pages 1-15
    2. Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer
      Pages 16-35
  3. Miscellaneous Techniques

    1. Rosario Gennaro, Shai Halevi
      Pages 53-70
    2. Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 71-91
    3. Sherman S. M. Chow
      Pages 92-107
  4. Hash Functions II

    1. Dmitry Khovratovich
      Pages 108-125
    2. Shuang Wu, Dengguo Feng, Wenling Wu
      Pages 126-140
    3. Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
      Pages 141-156
  5. Hardware Implementation and Cryptanalysis

    1. David Canright, Dag Arne Osvik
      Pages 157-169
    2. Daniel Loebenberger, Jens Putzka
      Pages 170-181
    3. Matthias Krause, Dirk Stegemann
      Pages 182-196
    4. Aleksandar Kircanski, Amr M. Youssef
      Pages 197-214
  6. Block Ciphers

    1. Meiqin Wang, Jorge Nakahara Jr., Yue Sun
      Pages 231-248
    2. Xiaorui Sun, Xuejia Lai
      Pages 266-280
    3. Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram
      Pages 281-294
  7. Modes of Operation

    1. Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
      Pages 295-312

About these proceedings

Introduction

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009.

From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems.

Keywords

AES DES Information LA MAC Permutation algorithms block ciphers calculus cryptography hash function hash functions privacy public key stream ciphers

Editors and affiliations

  • Michael J. JacobsonJr.
    • 1
  • Vincent Rijmen
    • 2
  • Reihaneh Safavi-Naini
    • 1
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.ESAT/COSICK.U. LeuvenLeuven-HeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-05445-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-05443-3
  • Online ISBN 978-3-642-05445-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349