Skip to main content
  • Conference proceedings
  • © 2009

Selected Areas in Cryptography

15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5381)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Elliptic and Hyperelliptic Curve Arithmetic

    1. Faster Halvings in Genus 2

      • Peter Birkner, Nicolas Thériault
      Pages 1-17
    2. On Software Parallel Implementation of Cryptographic Pairings

      • Philipp Grabher, Johann Großschädl, Dan Page
      Pages 35-50
  3. Block Ciphers I

    1. The Cryptanalysis of Reduced-Round SMS4

      • Jonathan Etrog, Matt J. B. Robshaw
      Pages 51-65
    2. Building Secure Block Ciphers on Generic Attacks Assumptions

      • Jacques Patarin, Yannick Seurin
      Pages 66-81
  4. First Invited Talk

    1. Lifting and Elliptic Curve Discrete Logarithms

      • Joseph H. Silverman
      Pages 82-102
  5. Hash Functions I

    1. Preimage Attacks on One-Block MD4, 63-Step MD5 and More

      • Kazumaro Aoki, Yu Sasaki
      Pages 103-119
    2. Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5

      • Jean-Philippe Aumasson, Willi Meier, Florian Mendel
      Pages 120-135
    3. Cryptanalysis of Tweaked Versions of SMASH and Reparation

      • Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer
      Pages 136-150
  6. Mathematical Aspects of Applied Cryptography I

  7. Stream Ciphers Cryptanalysis

    1. A Cache Timing Analysis of HC-256

      • Erik Zenner
      Pages 199-213
    2. An Improved Fast Correlation Attack on Stream Ciphers

      • Bin Zhang, Dengguo Feng
      Pages 214-227
  8. Hash Functions II

    1. A Three-Property-Secure Hash Function

      • Elena Andreeva, Bart Preneel
      Pages 228-244
    2. Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques

      • Charles Bouillaguet, Pierre-Alain Fouque
      Pages 245-261
    3. A Scheme to Base a Hash Function on a Block Cipher

      • Shoichi Hirose, Hidenori Kuwakado
      Pages 262-275
    4. Collisions and Other Non-random Properties for Step-Reduced SHA-256

      • Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
      Pages 276-293
  9. Cryptography with Algebraic Curves

    1. Public Verifiability from Pairings in Secret Sharing Schemes

      • Somayeh Heidarvand, Jorge L. Villar
      Pages 294-308

Other Volumes

  1. Selected Areas in Cryptography

Editors and Affiliations

  • Faculty of Mathematics and Horst Görtz Institute for IT-Security, Ruhr University Bochum, Germany

    Roberto Maria Avanzi

  • Department of Mathematics and Computer Science, Mount Allison University, Sackville, Canada

    Liam Keliher

  • Department of Mathematics and Computer Science, Mount Allison University – AceCrypt, Sackville, Canada

    Francesco Sica

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access