Selected Areas in Cryptography B

26 papers

YearTitle / Authors
2013Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
Lars R. Knudsen, Huapeng Wu
2012$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms.
Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi
2012A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery.
Zhenyu Huang, Dongdai Lin
2012A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.
David Galindo, Srinivas Vivek
2012All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach.
Takanori Isobe, Kyoji Shibutani
2012An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.
Martin R. Albrecht, Gregor Leander
2012An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
2012Attacking (EC)DSA Given Only an Implicit Hint.
Jean-Charles Faugère, Christopher Goyet, Guénaël Renault
2012Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef
2012Cryptanalysis of the "Kindle" Cipher.
Alex Biryukov, Gaëtan Leurent, Arnab Roy
2012Cryptanalysis of the Loiss Stream Cipher.
Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef
2012Cryptanalysis of the Xiao - Lai White-Box AES Implementation.
Yoni De Mulder, Peter Roelse, Bart Preneel
2012Cryptographically Strong de Bruijn Sequences with Large Periods.
Kalikinkar Mandal, Guang Gong
2012Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three.
Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao
2012Efficient Implementation of Bilinear Pairings on ARM Processors.
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
2012Extracts from the SHA-3 Competition.
Vincent Rijmen
2012Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann
2012Forward Secure Signatures on Smart Cards.
Andreas Hülsing, Christoph Busold, Johannes Buchmann
2012Improved Cryptanalysis of the Block Cipher KASUMI.
Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang
2012Lattice Reduction for Modular Knapsack.
Thomas Plantard, Willy Susilo, Zhenfei Zhang
2012Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers.
Yu Sasaki, Lei Wang
2012Private Stream Search at Almost the Same Communication Cost as a Regular Search.
Matthieu Finiasz, Kannan Ramchandran
2012Provable Security of BLAKE with Non-ideal Compression Function.
Elena Andreeva, Atul Luykx, Bart Mennink
2012Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.
Shengbao Wu, Mingsheng Wang, Wenling Wu
2012The Boomerang Attacks on the Round-Reduced Skein-512.
Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
2012Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$.
Jithra Adikari, M. Anwar Hasan, Christophe Nègre