Selected Areas in Cryptography B

30 papers

YearTitle / Authors
2014Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
Tanja Lange, Kristin E. Lauter, Petr Lisonek
2013A Group Action on ℤ
Jung Hee Cheon, Taechan Kim, Yong Soo Song
2013A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing
2013A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic.
Antoine Joux
2013A Three-Level Sieve Algorithm for the Shortest Vector Problem.
Feng Zhang, Yanbin Pan, Gengran Hu
2013AEGIS: A Fast Authenticated Encryption Algorithm.
Hongjun Wu, Bart Preneel
2013Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers.
Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
2013Exponentiating in Pairing Groups.
Joppe W. Bos, Craig Costello, Michael Naehrig
2013Extended Generalized Feistel Networks Using Matrix Representation.
Thierry P. Berger, Marine Minier, Gaël Thomas
2013Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2013Faster Hash-Based Signatures with Bounded Leakage.
Thomas Eisenbarth, Ingo von Maurich, Xin Ye
2013Faster Repeated Doublings on Binary Elliptic Curves.
Christophe Doche, Daniel Sutantyo
2013High Precision Discrete Gaussian Sampling on FPGAs.
Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2013Horizontal Collision Correlation Attack on Elliptic Curves.
Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild
2013How to Recover Any Byte of Plaintext on RC4.
Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
2013Implementing Lightweight Block Ciphers on x86 Architectures.
Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
2013Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.
Yu Sasaki, Lei Wang
2013Improvement and Efficient Implementation of a Lattice-Based Signature Scheme.
Rachid El Bansarkhani, Johannes Buchmann
2013Montgomery Multiplication Using Vector Instructions.
Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
2013Multiple Limited-Birthday Distinguishers and Applications.
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2013Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes.
Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson
2013Provable Second Preimage Resistance Revisited.
Charles Bouillaguet, Bastien Vayssière
2013Solving a 6120 -bit DLP on a Desktop Computer.
Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel
2013The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE.
Dmitry Khovratovich, Christian Rechberger
2013The Realm of the Pairings.
Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2013Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.
Thomas Pöppelmann, Tim Güneysu
2013Two Attacks on a White-Box AES Implementation.
Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
2013When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
David F. Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar
2013White-Box Security Notions for Symmetric Encryption Schemes.
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2013Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard