Limit search to available items
Book Cover
E-book
Author SAC (Conference) (18th : 2011 : Toronto, Ont.)

Title Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers / Ali Miri, Serge Vaudenay (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiii, 430 pages)
Series Lecture notes in computer science, 0302-9743 ; 7118
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7118.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL -- Improved Analysis of ECHO-256 -- Provable Chosen-Target-Forced-Midfix Preimage Resistance -- On CCA-Secure Somewhat Homomorphic Encryption -- Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources -- Group Law Computations on Jacobians of Hyperelliptic Curves -- Cryptographic Analysis of All 4 x 4-Bit S-Boxes -- The Cryptographic Power of Random Selection -- Proof of Empirical RC4 Biases and New Key Correlations -- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher -- Practical Attack on the Full MMB Block Cipher -- Conditional Differential Cryptanalysis of Trivium and KATAN -- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 -- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 -- New Insights on Impossible Differential Cryptanalysis -- A Unified Framework for Small Secret Exponent Attack on RSA -- Very Compact Hardware Implementations of the Blockcipher CLEFIA -- Another Look at Tightness -- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications -- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles -- ASC-1: An Authenticated Encryption Stream Cipher -- On Various Families of Twisted Jacobi Quartics -- Improved Three-Way Split Formulas for Binary Polynomial Multiplication -- Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves -- Faster Hashing to \mathbb G2G2
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography
Analysis Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Systems and Data Security
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computer Imaging, Vision, Pattern Recognition and Graphics
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Computer security -- Congresses
Informatique.
Computer security
Data encryption (Computer science)
Data protection
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Miri, Ali.
Vaudenay, Serge.
ISBN 9783642284960
3642284965
3642284957
9783642284953
Other Titles SAC 2011