Skip to main content
  • Conference proceedings
  • © 2012

Selected Areas in Cryptography

18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers

  • Fast-track conference proceedings

  • State-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7118)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2011.

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-28496-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (25 papers)

  1. Front Matter

  2. Selected Areas in Cryptography 2011

    1. Cryptanalysis of Hash Functions

      1. Improved Analysis of ECHO-256
        • Jérémy Jean, María Naya-Plasencia, Martin Schläffer
        Pages 19-36Open Access
      2. Provable Chosen-Target-Forced-Midfix Preimage Resistance
        • Elena Andreeva, Bart Mennink
        Pages 37-54Open Access
    2. Security in Clouds

      1. On CCA-Secure Somewhat Homomorphic Encryption
        • Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren
        Pages 55-72Open Access
    3. Invited Paper I

      1. Group Law Computations on Jacobians of Hyperelliptic Curves
        • Craig Costello, Kristin Lauter
        Pages 92-117Open Access
    4. Bits and Randomness

      1. Cryptographic Analysis of All 4 × 4-Bit S-Boxes
        • Markku-Juhani O. Saarinen
        Pages 118-133Open Access
      2. The Cryptographic Power of Random Selection
        • Matthias Krause, Matthias Hamann
        Pages 134-150Open Access
      3. Proof of Empirical RC4 Biases and New Key Correlations
        • Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
        Pages 151-168Open Access
    5. Cryptanalysis of Ciphers I

      1. Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
        • Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmancı
        Pages 169-184Open Access
      2. Practical Attack on the Full MMB Block Cipher
        • Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
        Pages 185-199Open Access
      3. Conditional Differential Cryptanalysis of Trivium and KATAN
        • Simon Knellwolf, Willi Meier, María Naya-Plasencia
        Pages 200-212Open Access
    6. Cryptanalysis of Ciphers II

      1. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
        • Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau
        Pages 230-242Open Access
      2. New Insights on Impossible Differential Cryptanalysis
        • Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent
        Pages 243-259Open Access
    7. Cryptanalysis of Public-Key Cryptography

      1. A Unified Framework for Small Secret Exponent Attack on RSA
        • Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
        Pages 260-277Open Access
    8. Cipher Implementation

      1. Very Compact Hardware Implementations of the Blockcipher CLEFIA
        • Toru Akishita, Harunaga Hiwatari
        Pages 278-292Open Access
    9. Invited Paper II

      1. Another Look at Tightness
        • Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
        Pages 293-319Open Access
    10. New Designs

      1. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
        • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
        Pages 320-337Open Access

Other Volumes

  1. Selected Areas in Cryptography

    18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011.

The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Keywords

  • RSA
  • authenticated encryption
  • hyperelliptic curves
  • key-recovery
  • message authentication
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science, Ryerson University, Toronto, Canada

    Ali Miri

  • Ecole Polytechnique Fédérale de Lausanne, Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-28496-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)