Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
by
 
Biham, Eli. editor.

Title
Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

Author
Biham, Eli. editor.

ISBN
9783540744627

Physical Description
XI, 395 p. online resource.

Series
Lecture Notes in Computer Science, 4356

Contents
Block Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABC v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genus 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design.

Subject Term
Computer science.
 
Computer Communication Networks.
 
Data protection.
 
Data encryption (Computer science).
 
Computer software.
 
Information systems.
 
Data Encryption.
 
Systems and Data Security.
 
Management of Computing and Information Systems.
 
Algorithm Analysis and Problem Complexity.
 
Information Systems Applications (incl.Internet).

Added Author
Biham, Eli.
 
Youssef, Amr M.

Added Corporate Author
SpringerLink (Online service)

Electronic Access
http://dx.doi.org/10.1007/978-3-540-74462-7


LibraryMaterial TypeItem BarcodeShelf NumberStatus
IYTE LibraryE-Book512793-1001QA76.9 .A25Online Springer