Advertisement

Selected Areas in Cryptography

10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers

  • Mitsuru Matsui
  • Robert J. Zuccherato
Conference proceedings SAC 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3006)

Table of contents

  1. Front Matter
  2. Elliptic and Hyperelliptic Curves

    1. Jan Pelzl, Thomas Wollinger, Christof Paar
      Pages 1-16
    2. Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
      Pages 17-25
    3. Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
      Pages 26-41
  3. Side Channel Attacks

  4. Security Protocols and Applications

    1. André Weimerskirch, Dirk Westhoff
      Pages 73-87
    2. Josef Pieprzyk, Huaxiong Wang, Chaoping Xing
      Pages 88-100
    3. Mingyan Li, Radha Poovendran
      Pages 101-116
  5. Cryptanalysis I

    1. Hüseyin Demirci, Ali Aydin Selçuk, Erkan Türe
      Pages 117-129
    2. Alex Biryukov, Joseph Lano, Bart Preneel
      Pages 130-144
    3. Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
      Pages 145-159
  6. Cryptanalysis II

    1. Henri Gilbert, Helena Handschuh
      Pages 175-193
    2. Antoine Joux, Frédéric Muller
      Pages 194-207
    3. Goce Jakimoski, Yvo Desmedt
      Pages 208-221
    4. Dai Watanabe, Alex Biryukov, Christophe De Cannière
      Pages 222-233
  7. Cryptographic Primitives

    1. Kazumaro Aoki, Serge Vaudenay
      Pages 234-247
    2. Alexander Klimov, Adi Shamir
      Pages 248-261
  8. Stream Ciphers

  9. Efficient Implementation

  10. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed postproceedings of the 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003, held in Ottawa, Canada, in August 2003.

The 25 revised full papers presented were carefully selected from 85 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic and hyperelliptic curves, side channel attacks, security protocols and applications, cryptanalysis, cryptographic primitives, stream ciphers, and efficient implementations.

Keywords

AES Boolean function Signatur Web service security algorithms block ciphers cryptanalysis cryptology data encryption finite field networks privacy public key cryptography security symmetric cryptosystems

Editors and affiliations

  • Mitsuru Matsui
    • 1
  • Robert J. Zuccherato
    • 2
  1. 1.Information Technology R&D CenterMitsubishi Electric CorporationKanagawaJapan
  2. 2.Entrust, Inc.OttawaCanada

Bibliographic information

  • DOI https://doi.org/10.1007/b96837
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-21370-3
  • Online ISBN 978-3-540-24654-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site