


default search action
SAC 2005: Waterloo, Ontario, Canada
- Bart Preneel, Stafford E. Tavares:

Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3897, Springer 2006, ISBN 3-540-33108-5
Stream Ciphers I
- Elad Barkan, Eli Biham:

Conditional Estimators: An Effective Attack on A5/1. 1-19 - Éliane Jaulmes, Frédéric Muller:

Cryptanalysis of the F-FCSR Stream Cipher Family. 20-35 - Frederik Armknecht

, Willi Meier:
Fault Attacks on Combiners with Memory. 36-50
Block Ciphers
- Duo Lei, Chao Li, Keqin Feng:

New Observation on Camellia. 51-64 - Thomas Baignères, Serge Vaudenay:

Proving the Security of AES Substitution-Permutation Network. 65-81
Modes of Operation
- Serge Mister, Robert J. Zuccherato:

An Attack on CFB Mode Encryption as Used by OpenPGP. 82-94 - William Eric Hall, Charanjit S. Jutla:

Parallelizable Authentication Trees. 95-109 - Alex Biryukov

, Sourav Mukhopadhyay, Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data. 110-127
Public Key Cryptography
- Adam L. Young, Moti Yung:

A Space Efficient Backdoor in RSA and Its Applications. 128-143 - Taek-Young Youn, Young-Ho Park

, Chang Han Kim, Jongin Lim:
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. 144-158
Stream Ciphers II
- An Braeken

, Joseph Lano:
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. 159-174 - Matthew Henricksen, Ed Dawson

:
Rekeying Issues in the MUGI Stream Cipher. 175-188
Key Establishment Protocols and Access Control
- Jooyoung Lee, Douglas R. Stinson:

Tree-Based Key Distribution Patterns. 189-204 - Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sang-Jae Moon:

Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. 205-220 - Jiang Wu, Ruizhong Wei:

An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. 221-232
Hash Functions
- Norbert Pramstaller, Christian Rechberger, Vincent Rijmen

:
Breaking a New Hash Function Design Strategy Called SMASH. 233-244 - Hirotaka Yoshida, Alex Biryukov:

Analysis of a SHA-256 Variant. 245-260 - Norbert Pramstaller, Christian Rechberger, Vincent Rijmen

:
Impact of Rotations in SHA-1 and Related Hash Functions. 261-275
Protocols for RFID Tags
- David Molnar, Andrea Soppera, David A. Wagner:

A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. 276-290 - Gildas Avoine, Etienne Dysli, Philippe Oechslin:

Reducing Time Complexity in RFID Systems. 291-306
Efficient Implementations
- Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone:

Accelerated Verification of ECDSA Signatures. 307-318 - Paulo S. L. M. Barreto, Michael Naehrig:

Pairing-Friendly Elliptic Curves of Prime Order. 319-331 - Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger

:
Minimality of the Hamming Weight of the T-NAF for Koblitz Curves and Improved Combination with Point Halving. 332-344 - Nicolas Thériault

:
SPA Resistant Left-to-Right Integer Recodings. 345-358 - Joachim von zur Gathen, Jamshid Shokrollahi:

Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F2. 359-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














