Selected Areas in Cryptography -- SAC 2013

20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers

  • Tanja Lange
  • Kristin Lauter
  • Petr Lisoněk

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8282)

Also part of the Security and Cryptology book sub series (LNSC, volume 8282)

Table of contents

  1. White Box Crypto

    1. Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
      Pages 247-264
    2. Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
      Pages 265-285
  2. Block Ciphers

    1. Front Matter
      Pages 287-287
    2. Thierry P. Berger, Marine Minier, Gaël Thomas
      Pages 289-305
    3. Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard
      Pages 306-323
    4. Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
      Pages 324-351
  3. Invited Talk

  4. Lattices Part II

    1. Front Matter
      Pages 381-381
    2. Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
      Pages 383-401
    3. Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
      Pages 402-417
  5. Elliptic Curves, Pairings and RSA

    1. Front Matter
      Pages 419-419
    2. Joppe W. Bos, Craig Costello, Michael Naehrig
      Pages 438-455
    3. Christophe Doche, Daniel Sutantyo
      Pages 456-470
    4. Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
      Pages 471-489
  6. Hash Functions and MACs

    1. Front Matter
      Pages 491-491
    2. Charles Bouillaguet, Bastien Vayssière
      Pages 513-532
    3. Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
      Pages 533-550

About these proceedings


This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.


MAC algorithms RSA applied cryptology authentication block and stream ciphers cryptography discrete logarithms elliptic curve cryptography hash functions hyperelliptic curve cryptography lattices mathematical foundations of cryptography pairing public key algorithms public key encryption security and privacy security services side-channel attacks symmetric cryptography

Editors and affiliations

  • Tanja Lange
    • 1
  • Kristin Lauter
    • 2
  • Petr Lisoněk
    • 3
  1. 1.Technische Universiteit EindhovenEindhovenThe Netherlands
  2. 2.Microsoft ResearchRedmondUSA
  3. 3.Simon Fraser UniversityBurnabyCanada

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43413-0
  • Online ISBN 978-3-662-43414-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book