


default search action
SAC 2003: Ottawa, Canada
- Mitsuru Matsui, Robert J. Zuccherato:
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers. Lecture Notes in Computer Science 3006, Springer 2004, ISBN 3-540-21370-8 - Jan Pelzl, Thomas J. Wollinger, Christof Paar:
Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves. 1-16 - Paulo S. L. M. Barreto, Ben Lynn, Michael Scott:
On the Selection of Pairing-Friendly Groups. 17-25 - Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi:
Counting Points for Hyperelliptic Curves of Type y2= x5 + ax over Finite Prime Fields. 26-41 - Colin D. Walter:
Longer Keys May Facilitate Side Channel Attacks. 42-57 - Nevine Maurice Ebeid, M. Anwar Hasan:
On Randomizing Private Keys to Counteract DPA Attacks. 58-72 - André Weimerskirch, Dirk Westhoff:
Zero Common-Knowledge Authentication for Pervasive Networks. 73-87 - Josef Pieprzyk
, Huaxiong Wang, Chaoping Xing:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. 88-100 - Mingyan Li, Radha Poovendran
:
Broadcast Enforced Threshold Schemes with Disenrollment. 101-116 - Hüseyin Demirci, Ali Aydin Selçuk
, Erkan Türe:
A New Meet-in-the-Middle Attack on the IDEA Block Cipher. 117-129 - Alex Biryukov, Joseph Lano, Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function. 130-144 - Pierre-Alain Fouque
, Antoine Joux
, Gwenaëlle Martinet, Frédéric Valette:
Authenticated On-Line Encryption. 145-159 - Douglas Wikström:
Five Practical Attacks for "Optimistic Mixing for Exit-Polls". 160-175 - Henri Gilbert, Helena Handschuh:
Security Analysis of SHA-256 and Sisters. 175-193 - Antoine Joux, Frédéric Muller:
A Chosen IV Attack Against Turing. 194-207 - Goce Jakimoski, Yvo Desmedt:
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. 208-221 - Dai Watanabe, Alex Biryukov
, Christophe De Cannière:
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. 222-233 - Kazumaro Aoki, Serge Vaudenay:
On the Use of GF-Inversion as a Cryptographic Primitive. 234-247 - Alexander Klimov, Adi Shamir:
Cryptographic Applications of T-Functions. 248-261 - Jovan Dj. Golic:
On the Success of the Embedding Attack on the Alternating Step Generator. 262-274 - Guang Gong, Khoongming Khoo:
Additive Autocorrelation of Resilient Boolean Functions. 275-290 - Claude Carlet, Emmanuel Prouff:
On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators. 291-305 - James A. Muir, Douglas R. Stinson:
Alternative Digit Sets for Nonadjacent Representations. 306-319 - Roberto Maria Avanzi, Preda Mihailescu:
Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures (Extended Abstract). 320-334 - Jaewook Chung, M. Anwar Hasan:
More Generalized Mersenne Numbers: (Extended Abstract). 335-347 - Charanjit S. Jutla:
Lower Bound on Linear Authenticated Encryption. 348-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.