Selected Areas in Cryptography B

30 papers

YearTitle / Authors
2009Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
Roberto Maria Avanzi, Liam Keliher, Francesco Sica
2008A Cache Timing Analysis of HC-256.
Erik Zenner
2008A Scheme to Base a Hash Function on a Block Cipher.
Shoichi Hirose, Hidenori Kuwakado
2008A Three-Property-Secure Hash Function.
Elena Andreeva, Bart Preneel
2008Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
Côme Berbain, Henri Gilbert, Antoine Joux
2008An Improved Fast Correlation Attack on Stream Ciphers.
Bin Zhang, Dengguo Feng
2008Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques.
Charles Bouillaguet, Pierre-Alain Fouque
2008Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators.
Kyohei Suzuki, Tetsu Iwata
2008Building Secure Block Ciphers on Generic Attacks Assumptions.
Jacques Patarin, Yannick Seurin
2008Collisions and Other Non-random Properties for Step-Reduced SHA-256.
Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
2008Counting Functions for the
Ramakanth Kavuluru, Andrew Klapper
2008Cryptanalysis of Tweaked Versions of SMASH and Reparation.
Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer
2008Cryptanalysis of a Generic Class of White-Box Implementations.
Wil Michiels, Paul Gorissen, Henk D. L. Hollmann
2008Distinguishing Multiplications from Squaring Operations.
Frédéric Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane
2008ECC Is Ready for RFID - A Proof in Silicon.
Daniel M. Hein, Johannes Wolkerstorfer, Norbert Felber
2008Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Xinxin Fan, Guang Gong, David Jao
2008Faster Halvings in Genus 2.
Peter Birkner, Nicolas Thériault
2008HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Junfeng Fan, Lejla Batina, Ingrid Verbauwhede
2008Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Wenling Wu, Lei Zhang, Wentao Zhang
2008Lifting and Elliptic Curve Discrete Logarithms.
Joseph H. Silverman
2008New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Meiqin Wang, Xiaoyun Wang, Changhui Hu
2008On Software Parallel Implementation of Cryptographic Pairings.
Philipp Grabher, Johann Großschädl, Dan Page
2008On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
Matthieu Rivain
2008Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.
Jean-Philippe Aumasson, Willi Meier, Florian Mendel
2008Preimage Attacks on One-Block MD4, 63-Step MD5 and More.
Kazumaro Aoki, Yu Sasaki
2008Public Verifiability from Pairings in Secret Sharing Schemes.
Somayeh Heidarvand, Jorge L. Villar
2008Subquadratic Polynomial Multiplication over
Éric Schost, Arash Hariri
2008The "Coefficients H" Technique.
Jacques Patarin
2008The Cryptanalysis of Reduced-Round SMS4.
Jonathan Etrog, Matthew J. B. Robshaw
2008The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.
Kristin E. Lauter, Katherine E. Stange