Selected Areas in Cryptography B

27 papers

YearTitle / Authors
2007Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Eli Biham, Amr M. Youssef
2006Advances on Access-Driven Cache Attacks on AES.
Michael Neve, Jean-Pierre Seifert
2006Blind Differential Cryptanalysis for Enhanced Power Attacks.
Helena Handschuh, Bart Preneel
2006Changing the Odds Against Masked Logic.
Kris Tiri, Patrick Schaumont
2006Constructing an Ideal Hash Function from Weak Ideal Compression Functions.
Moses D. Liskov
2006Crossword Puzzle Attack on NLS.
Joo Yeon Cho, Josef Pieprzyk
2006Cryptanalysis of Achterbahn-Version 2.
Martin Hell, Thomas Johansson
2006Cryptanalysis of the Stream Cipher ABC v2.
Hongjun Wu, Bart Preneel
2006Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.
Roberto Maria Avanzi
2006Dial C for Cipher.
Thomas Baignères, Matthieu Finiasz
2006Efficient Divisor Class Halving on Genus Two Curves.
Peter Birkner
2006Efficient Implementations of Multivariate Quadratic Systems.
Côme Berbain, Olivier Billet, Henri Gilbert
2006Extended Hidden Number Problem and Its Cryptanalytic Applications.
Martin Hlavác, Tomás Rosa
2006Improved DST Cryptanalysis of IDEA.
Eyüp Serdar Ayaz, Ali Aydin Selçuk
2006Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
2006Improved Security Analysis of XEX and LRW Modes.
Kazuhiko Minematsu
2006Message Authentication on 64-Bit Architectures.
Ted Krovetz
2006Multi-pass Fast Correlation Attack on Stream Ciphers.
Bin Zhang, Dengguo Feng
2006On Redundant
Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger
2006On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Martin Hell, Thomas Johansson
2006Pairing Calculation on Supersingular Genus 2 Curves.
Colm O'hEigeartaigh, Michael Scott
2006Provably Good Codes for Hash Function Design.
Charanjit S. Jutla, Anindya C. Patthak
2006Related-Key Rectangle Attack on the Full SHACAL-1.
Orr Dunkelman, Nathan Keller, Jongsung Kim
2006Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.
Goce Jakimoski
2006The Design of a Stream Cipher LEX.
Alex Biryukov
2006Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
2006When Stream Cipher Analysis Meets Public-Key Cryptography.
Matthieu Finiasz, Serge Vaudenay