Skip to main content
  • Conference proceedings
  • © 2014

Selected Areas in Cryptography -- SAC 2014

21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8781)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2014.

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-13051-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (22 papers)

  1. Front Matter

    Pages I-X
  2. Malicious Hashing: Eve’s Variant of SHA-1

    • Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
    Pages 1-19Open Access
  3. Binary Elligator Squared

    • Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
    Pages 20-37Open Access
  4. Batch NFS

    • Daniel J. Bernstein, Tanja Lange
    Pages 38-58Open Access
  5. Colliding Keys for SC2000-256

    • Alex Biryukov, Ivica Nikolić
    Pages 77-91Open Access
  6. Faster Binary-Field Multiplication and Faster Binary-Field MACs

    • Daniel J. Bernstein, Tung Chou
    Pages 92-111Open Access
  7. OMD: A Compression Function Mode of Operation for Authenticated Encryption

    • Simon Cogliani, Diana-Ştefania Maimuţ, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay et al.
    Pages 112-128Open Access
  8. Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results

    • Benoit Cogliati, Jacques Patarin, Yannick Seurin
    Pages 129-146Open Access
  9. Differential Cryptanalysis of SipHash

    • Christoph Dobraunig, Florian Mendel, Martin Schläffer
    Pages 165-182Open Access
  10. Weak Instances of PLWE

    • Kirsten Eisenträger, Sean Hallgren, Kristin Lauter
    Pages 183-194Open Access
  11. The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function

    • Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
    Pages 195-211Open Access
  12. Side-Channel Analysis of Montgomery’s Representation Randomization

    • Eliane Jaulmes, Emmanuel Prouff, Justine Wild
    Pages 212-227Open Access
  13. Practical Cryptanalysis of PAES

    • Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang
    Pages 228-242Open Access
  14. Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation

    • Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
    Pages 243-260Open Access
  15. Error-Tolerant Side-Channel Cube Attack Revisited

    • Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan
    Pages 261-277Open Access
  16. A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups

    • Alexander May, Ilya Ozerov
    Pages 278-289Open Access
  17. Linear Biases in AEGIS Keystream

    • Brice Minaud
    Pages 290-305Open Access
  18. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers

    • Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
    Pages 306-323Open Access

Other Volumes

  1. Selected Areas in Cryptography -- SAC 2014

    21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

About this book

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Keywords

  • Algorithms for cryptography
  • Authenticated encryption
  • Block ciphers
  • Cryptanalysis
  • Cryptanalysis and their complexity analysis
  • Cryptographic permutations
  • Cryptography
  • Efficient implementations of symmetric and public key algorithms
  • Hash function
  • MAC algorithms
  • Mathematical and algorithmic aspects of applied cryptology
  • Stream ciphers
  • Symmetric key primitives
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Fondation Partenariale de l'UPMC, Paris Cedex, France

    Antoine Joux

  • Concordia University, Montreal, Canada

    Amr Youssef

Bibliographic Information

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-13051-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)