Advertisement

Selected Areas in Cryptography -- SAC 2013

20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers

  • Tanja Lange
  • Kristin Lauter
  • Petr Lisoněk

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8282)

Also part of the Security and Cryptology book sub series (LNSC, volume 8282)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Invited Talk

    1. Front Matter
      Pages 1-1
    2. Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
      Pages 3-25
  3. Lattices Part I

    1. Front Matter
      Pages 27-27
    2. Feng Zhang, Yanbin Pan, Gengran Hu
      Pages 29-47
    3. Rachid El Bansarkhani, Johannes Buchmann
      Pages 48-67
  4. Invited Talk

    1. Front Matter
      Pages 87-87
    2. Kevin Henry, Maura B. Paterson, Douglas R. Stinson
      Pages 89-117
  5. Discrete Logarithms

    1. Front Matter
      Pages 119-119
    2. Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
      Pages 136-152
  6. Stream Ciphers and Authenticated Encryption

    1. Front Matter
      Pages 153-153
    2. Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
      Pages 155-173
    3. Dmitry Khovratovich, Christian Rechberger
      Pages 174-184
    4. Hongjun Wu, Bart Preneel
      Pages 185-201
  7. Post--quantum (Hash-Based and System Solving)

    1. Front Matter
      Pages 203-203
    2. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
      Pages 205-222
    3. Thomas Eisenbarth, Ingo von Maurich, Xin Ye
      Pages 223-243
  8. White Box Crypto

    1. Front Matter
      Pages 245-245
    2. Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
      Pages 247-264
    3. Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
      Pages 265-285
  9. Block Ciphers

    1. Front Matter
      Pages 287-287
    2. Thierry P. Berger, Marine Minier, Gaël Thomas
      Pages 289-305
    3. Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard
      Pages 306-323
    4. Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
      Pages 324-351
  10. Invited Talk

  11. Lattices Part II

    1. Front Matter
      Pages 381-381
    2. Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
      Pages 383-401
    3. Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
      Pages 402-417
  12. Elliptic Curves, Pairings and RSA

    1. Front Matter
      Pages 419-419
    2. Joppe W. Bos, Craig Costello, Michael Naehrig
      Pages 438-455
    3. Christophe Doche, Daniel Sutantyo
      Pages 456-470
    4. Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
      Pages 471-489
  13. Hash Functions and MACs

    1. Front Matter
      Pages 491-491
    2. Charles Bouillaguet, Bastien Vayssière
      Pages 513-532
    3. Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
      Pages 533-550
  14. Side-Channel Attacks

    1. Front Matter
      Pages 551-551
    2. Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild
      Pages 553-570
    3. David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar
      Pages 571-588
  15. Back Matter
    Pages 589-590

About these proceedings

Introduction

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.

Keywords

MAC algorithms RSA applied cryptology authentication block and stream ciphers cryptography discrete logarithms elliptic curve cryptography hash functions hyperelliptic curve cryptography lattices mathematical foundations of cryptography pairing public key algorithms public key encryption security and privacy security services side-channel attacks symmetric cryptography

Editors and affiliations

  • Tanja Lange
    • 1
  • Kristin Lauter
    • 2
  • Petr Lisoněk
    • 3
  1. 1.Technische Universiteit EindhovenEindhovenThe Netherlands
  2. 2.Microsoft ResearchRedmondUSA
  3. 3.Simon Fraser UniversityBurnabyCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-43414-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43413-0
  • Online ISBN 978-3-662-43414-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site