Skip to main content
  • Conference proceedings
  • © 2007

Selected Areas in Cryptography

13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4356)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (26 papers)

  1. Front Matter

  2. Block Cipher Cryptanalysis

    1. Improved DST Cryptanalysis of IDEA

      • Eyüp Serdar Ayaz, Ali Aydın Selçuk
      Pages 1-14
    2. Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192

      • Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
      Pages 15-27
    3. Related-Key Rectangle Attack on the Full SHACAL-1

      • Orr Dunkelman, Nathan Keller, Jongsung Kim
      Pages 28-44
  3. Stream Cipher Cryptanalysis I

    1. Cryptanalysis of Achterbahn-Version 2

      • Martin Hell, Thomas Johansson
      Pages 45-55
    2. Cryptanalysis of the Stream Cipher ABC v2

      • Hongjun Wu, Bart Preneel
      Pages 56-66
    3. Block and Stream Ciphers

      1. The Design of a Stream Cipher LEX
        • Alex Biryukov
        Pages 67-75
      2. Dial C for Cipher
        • Thomas Baignères, Matthieu Finiasz
        Pages 76-95
      3. Improved Security Analysis of XEX and LRW Modes
        • Kazuhiko Minematsu
        Pages 96-113
    4. Side-Channel Attacks

      1. Extended Hidden Number Problem and Its Cryptanalytic Applications
        • Martin Hlaváč, Tomáš Rosa
        Pages 114-133
      2. Changing the Odds Against Masked Logic
        • Kris Tiri, Patrick Schaumont
        Pages 134-146
      3. Advances on Access-Driven Cache Attacks on AES
        • Michael Neve, Jean-Pierre Seifert
        Pages 147-162
      4. Blind Differential Cryptanalysis for Enhanced Power Attacks
        • Helena Handschuh, Bart Preneel
        Pages 163-173
  4. Efficient Implementations I

    1. Efficient Implementations of Multivariate Quadratic Systems

      • Côme Berbain, Olivier Billet, Henri Gilbert
      Pages 174-187
    2. Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication

      • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
      Pages 188-202
  5. Stream Cipher Cryptanalysis II

    1. Multi-pass Fast Correlation Attack on Stream Ciphers

      • Bin Zhang, Dengguo Feng
      Pages 234-248
    2. Crossword Puzzle Attack on NLS

      • Joo Yeon Cho, Josef Pieprzyk
      Pages 249-265
  6. Invited Talk

    1. When Stream Cipher Analysis Meets Public-Key Cryptography

      • Matthieu Finiasz, Serge Vaudenay
      Pages 266-284

Other Volumes

  1. Selected Areas in Cryptography

Keywords

  • AES
  • DES
  • Message Authentication Code
  • access control
  • authentication
  • block ciphers
  • cryptographic attacks
  • cryptography
  • cryptosystems
  • digital signatures
  • elliptic curve
  • hash functions
  • hyper-threading
  • hyperelliptic curve
  • multivari
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions