Selected Areas in Cryptography -- SAC 2013

20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers

  • Tanja Lange
  • Kristin Lauter
  • Petr Lisoněk

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8282)

Also part of the Security and Cryptology book sub series (LNSC, volume 8282)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Invited Talk

    1. Front Matter
      Pages 1-1
    2. Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
      Pages 3-25
  3. Lattices Part I

    1. Front Matter
      Pages 27-27
    2. Feng Zhang, Yanbin Pan, Gengran Hu
      Pages 29-47
    3. Rachid El Bansarkhani, Johannes Buchmann
      Pages 48-67
  4. Invited Talk

    1. Front Matter
      Pages 87-87
    2. Kevin Henry, Maura B. Paterson, Douglas R. Stinson
      Pages 89-117
  5. Discrete Logarithms

    1. Front Matter
      Pages 119-119
    2. Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
      Pages 136-152
  6. Stream Ciphers and Authenticated Encryption

    1. Front Matter
      Pages 153-153
    2. Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
      Pages 155-173
    3. Dmitry Khovratovich, Christian Rechberger
      Pages 174-184
    4. Hongjun Wu, Bart Preneel
      Pages 185-201
  7. Post--quantum (Hash-Based and System Solving)

    1. Front Matter
      Pages 203-203
    2. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
      Pages 205-222
    3. Thomas Eisenbarth, Ingo von Maurich, Xin Ye
      Pages 223-243
  8. White Box Crypto

    1. Front Matter
      Pages 245-245

About these proceedings


This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.


MAC algorithms RSA applied cryptology authentication block and stream ciphers cryptography discrete logarithms elliptic curve cryptography hash functions hyperelliptic curve cryptography lattices mathematical foundations of cryptography pairing public key algorithms public key encryption security and privacy security services side-channel attacks symmetric cryptography

Editors and affiliations

  • Tanja Lange
    • 1
  • Kristin Lauter
    • 2
  • Petr Lisoněk
    • 3
  1. 1.Technische Universiteit EindhovenEindhovenThe Netherlands
  2. 2.Microsoft ResearchRedmondUSA
  3. 3.Simon Fraser UniversityBurnabyCanada

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43413-0
  • Online ISBN 978-3-662-43414-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site