Selected Areas in Cryptography [electronic resource] : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers / edited by Lars R. Knudsen, Huapeng Wu.
Record details
- ISBN: 9783642359996
- Physical Description: XIV, 407 p. 61 illus. online resource.
- Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : 2013.
Search for related items by subject
Search for related items by series
Electronic resources
| Cryptanalysis | ||
| An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers | ||
| A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery | ||
| Cryptanalysis of the Xiao â Lai White-Box AES Implementation | ||
| Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model | ||
| Forward Secure Signatures on Smart Cards | ||
| The Stafford Tavares Lecture Extracts from the SHA-3 Competition | ||
| Stream Ciphers Cryptanalysis of the âKindleâ Cipher | ||
| Cryptographically Strong de Bruijn Sequences with Large Periods | ||
| Cryptanalysis of the Loiss Stream Cipher | ||
| Implementations | ||
| Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three | ||
| Efficient Implementation of Bilinear Pairings on ARM Processors | ||
| Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 | ||
| Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers | ||
| Block Cipher Cryptanalysis | ||
| All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach | ||
| Improved Cryptanalysis of the Block Cipher KASUMI | ||
| Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers | ||
| Attacking (EC)DSA Given Only an Implicit Hint | ||
| Lattice Reduction for Modular Knapsack | ||
| Hash Functions | ||
| The Boomerang Attacks on the Round-Reduced Skein-512 | ||
| Boomerang and Slide-Rotational Analysis of the SM3 Hash Function | ||
| Provable Security of BLAKE with Non-ideal Compression Function | ||
| Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms | ||
| Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions | ||
| Miscellaneous | ||
| Private Stream Search at Almost the Same Communication Cost as a Regular Search | ||
| An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks. |