© 2019

Selected Areas in Cryptography – SAC 2018

25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers

  • Carlos Cid
  • Michael J. Jacobson Jr.
Conference proceedings SAC 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11349)

Also part of the Security and Cryptology book sub series (LNSC, volume 11349)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Design of Symmetric Key Primitives

    1. Front Matter
      Pages 1-1
    2. Sarah Miracle, Scott Yilek
      Pages 3-26
    3. Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
      Pages 27-49
  3. Cryptanalysis of Symmetric Key Primitives

    1. Front Matter
      Pages 71-71
    2. Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef
      Pages 73-91
    3. Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang
      Pages 92-114
    4. Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
      Pages 115-138
    5. Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
      Pages 139-162
  4. Side Channel and Fault Attacks

    1. Front Matter
      Pages 191-191
    2. Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
      Pages 216-234
    3. Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
      Pages 257-277
  5. Post-Quantum Cryptography

    1. Front Matter
      Pages 279-279
    2. Ryann Cartor, Daniel Smith-Tone
      Pages 281-299
    3. Ward Beullens, Bart Preneel, Alan Szepieniec
      Pages 300-321
    4. Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
      Pages 322-343

About these proceedings


This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. 

The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas:

  • design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes
  • efficient implementations of symmetric and public key algorithms
  • mathematical and algorithmic aspects of applied cryptology
  • cryptography for the Internet of Things


artificial intelligence authentication block ciphers cryptanalysis and other attacks cryptographic primitives cryptographic protocols data security encryption lyapunov methods mathematical foundations of cryptography matrix algebra network security probability public key (asymmetric) techniques security side-channel analysis and countermeasures symmetric cryptography and hash functions

Editors and affiliations

  1. 1.Royal Holloway, University of LondonEghamUK
  2. 2.University of CalgaryCalgaryCanada

Bibliographic information