default search action
SAC 2010: Waterloo, Ontario, Canada
- Alex Biryukov
, Guang Gong, Douglas R. Stinson:
Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6544, Springer 2011, ISBN 978-3-642-19573-0
Hash Functions I
- Christina Boura, Anne Canteaut:
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256. 1-17 - Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent
, Pierre-Alain Fouque:
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512. 18-35 - Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel
:
The Differential Analysis of S-Functions. 36-56
Stream Ciphers
- Julia Borghoff, Lars R. Knudsen
, Krystian Matusiewicz:
Hill Climbing Algorithms and Trivium. 57-73 - Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux:
Discovery and Exploitation of New Biases in RC4. 74-91
The Stafford Tavares Lecture
- Keith M. Martin:
The Rise and Fall and Rise of Combinatorial Key Predistribution. 92-98
Efficient Implementations
- Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah:
A Low-Area Yet Performant FPGA Implementation of Shabal. 99-113 - Thomas Plos, Hannes Groß, Martin Feldhofer:
Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags. 114-129 - René Struik:
Batch Computations Revisited: Combining Key Computations and Batch Verifications. 130-142
Coding and Combinatorics
- Daniel J. Bernstein, Tanja Lange, Christiane Peters:
Wild McEliece. 143-158 - Matthieu Finiasz:
Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme. 159-170 - Pierre-Louis Cayrel, Pascal Véron
, Sidi Mohamed El Yousfi Alaoui:
A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. 171-186 - Mario Lamberger, Vincent Rijmen
:
Optimal Covering Codes for Finding Near-Collisions. 187-197
Block Ciphers
- Ivica Nikolic:
Tweaking AES. 198-210 - Kyoji Shibutani:
On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis. 211-228 - Andrey Bogdanov
, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. 229-240
Side Channel Attacks
- Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman:
Improving DPA by Peak Distribution Analysis. 241-261 - Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain:
Affine Masking against Higher-Order Side Channel Analysis. 262-280
Invited Talk
- Alexandra Boldyreva:
Search on Encrypted Data in the Symmetric-Key Setting. 281
Mathematical Aspects
- Christophe Petit
, Jean-Jacques Quisquater:
Preimages for the Tillich-Zémor Hash Function. 282-301 - Payman Mohassel:
One-Time Signatures and Chameleon Hash Functions. 302-319 - Frederik Armknecht
, Jun Furukawa:
On the Minimum Communication Effort for Secure Group Key Exchange. 320-337
Hash Functions
- Jian Guo
, Søren S. Thomsen:
Deterministic Differential Properties of the Compression Function of BMW. 338-350 - Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
:
Security Analysis of SIMD. 351-368 - Martin Schläffer:
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function. 369-387 - Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer:
Cryptanalysis of Luffa v2 Components. 388-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.