Selected Areas in Cryptography B

26 papers

YearTitle / Authors
2006Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
Bart Preneel, Stafford E. Tavares
2005A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
David Molnar, Andrea Soppera, David A. Wagner
2005A Space Efficient Backdoor in RSA and Its Applications.
Adam L. Young, Moti Yung
2005Accelerated Verification of ECDSA Signatures.
Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone
2005An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.
Jiang Wu, Ruizhong Wei
2005An Attack on CFB Mode Encryption as Used by OpenPGP.
Serge Mister, Robert J. Zuccherato
2005An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim
2005Analysis of a SHA-256 Variant.
Hirotaka Yoshida, Alex Biryukov
2005Breaking a New Hash Function Design Strategy Called SMASH.
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2005Conditional Estimators: An Effective Attack on A5/1.
Elad Barkan, Eli Biham
2005Cryptanalysis of the F-FCSR Stream Cipher Family.
Éliane Jaulmes, Frédéric Muller
2005Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F
Joachim von zur Gathen, Jamshid Shokrollahi
2005Fault Attacks on Combiners with Memory.
Frederik Armknecht, Willi Meier
2005Impact of Rotations in SHA-1 and Related Hash Functions.
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2005Improved Time-Memory Trade-Offs with Multiple Data.
Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar
2005Minimality of the Hamming Weight of the
Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger
2005New Observation on Camellia.
Duo Lei, Chao Li, Keqin Feng
2005On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.
An Braeken, Joseph Lano
2005Pairing-Friendly Elliptic Curves of Prime Order.
Paulo S. L. M. Barreto, Michael Naehrig
2005Parallelizable Authentication Trees.
William Eric Hall, Charanjit S. Jutla
2005Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sang-Jae Moon
2005Proving the Security of AES Substitution-Permutation Network.
Thomas Baignères, Serge Vaudenay
2005Reducing Time Complexity in RFID Systems.
Gildas Avoine, Etienne Dysli, Philippe Oechslin
2005Rekeying Issues in the MUGI Stream Cipher.
Matthew Henricksen, Ed Dawson
2005SPA Resistant Left-to-Right Integer Recodings.
Nicolas Thériault
2005Tree-Based Key Distribution Patterns.
Jooyoung Lee, Douglas R. Stinson