AuthorBiham, Eli. editor
TitleSelected Areas in Cryptography [electronic resource] : 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers / edited by Eli Biham, Amr M. Youssef
ImprintBerlin, Heidelberg : Springer Berlin Heidelberg, 2007
Connect tohttp://dx.doi.org/10.1007/978-3-540-74462-7
Descript XI, 395 p. online resource

SUMMARY

These are the proceedings of SAC 2006, the thirteenth annual workshop on - lectedAreasinCryptography. TheworkshopwassponsoredbytheConcordia- stitute for Information Systems Engineering, in cooperation with the IACR, the International Association of Cryptologic Research,www. iacr. org. Thisyear's themes for SAC were: 1. Design and analysis of symmetric key cryptosystems 2. Primitives for symmetric key cryptography, including block and stream - phers, hash functions, and MAC algorithms 3. E?cient implementations of symmetric and public key algorithms 4. Side-channel analysis (DPA, DFA, Cache analysis, etc. ) A total of 25 papers were accepted for presentation at the workshop, out of 86 papers submitted (of which one was withdrawn by the authors shortly after the submission deadline). These proceedings contain revised versions of the accepted papers. In addition two invited talks were given: Adi Shamir gave the Sta?ord Tavares Lecture, entitled "A Top View of Side Channels". The second invited talk was givenby Serge Vaudenay entitled "When Stream Cipher Analysis Meets Public-Key Cryptography" (his paper on this topic is enclosed in these proceedings). The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed by at least three members of the ProgramCommittee,andpapersco-authoredbyamemberoftheProgramC- mittee were reviewed by at least ?ve (other) members. The reviews were then followedbydeepdiscussionsonthepapers,whichcontributedalottothequality of the ?nal selection. In most cases, extensive comments were sent to the - thors


CONTENT

Block Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABCย v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genusย 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design


SUBJECT

  1. Computer science
  2. Computer Communication Networks
  3. Data protection
  4. Data encryption (Computer science)
  5. Computer software
  6. Information systems
  7. Information Systems
  8. Computer Science
  9. Data Encryption
  10. Systems and Data Security
  11. Management of Computing and Information Systems
  12. Algorithm Analysis and Problem Complexity
  13. Computer Communication Networks
  14. Information Systems Applications (incl.Internet)